wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Veg Mix Pickle

Blog banner

A buffer overflow

Blog banner

IP ADDRESS

Blog banner

Security Issues and Countermeasures

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Worms, viruses and Bots

Blog banner

Pandas Matrix Applications

Blog banner

Service Strategy principles

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Crypto tax evasion

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Memory Management

Blog banner

Water Resources are about to exhaust...

Blog banner

Question

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Business-to-Business

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Deadlock

Blog banner

Data Science & AI

Blog banner

Chicken Dum Biryani

Blog banner

Memory managment

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

How to Conquer Depression ?

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

Google classroom

Blog banner

Understanding Mobile Device Forensics

Blog banner

PERT Overview

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

MYNTRA

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Types of Threads

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Cyber Forensics

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

Decision Tree: A Diagram Model

Blog banner

Senseless Teeths

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

GIS Topography

Blog banner

Getting into anime My anime suggestions

Blog banner

Install Ubuntu in Vmware

Blog banner