Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security.
Sudesh KumarLakshmi Jayant KitturAlwyn Roshan PaisPublished in: ICISS (2020)
Keyphrases
- mobile devices
- malware detection
- mobile applications
- smart phones
- security threats
- android platform
- security mechanisms
- security problems
- security protocols
- operating system
- computer security
- denial of service attacks
- mobile platforms
- java card
- security vulnerabilities
- mobile phone
- information security
- security issues
- anti virus
- cyber attacks
- context aware
- mobile apps
- cryptographic protocols
- fault injection
- windows xp
- access control
- malicious users
- security measures
- malicious attacks
- security flaws
- stream cipher
- chosen plaintext
- desktop computers
- key management
- countermeasures
- smart card
- open source
- security risks
- security breaches
- anomaly detection