SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1543
ANDROID DEVICE ATTACKS AND THREATS
A Manisha Yadav1, Dr. B. Indira Reddy2
1Student, Dept. of Information Technology, Sreenidhi Institute of Science and Technology, Telangana, India
2Professor, Dept. of Information Technology, Sreenidhi Institute of Science and Technology, Telangana, India
-----------------------------------------------------------------------***------------------------------------------------------------------------
Abstract: In this modern era, people believe that a mobile is everything. Each and every person has a mobile phone most
preferably a smart phone. Anything and everything available on the web can be accessed from anywhere by anyone possessing a
smartphone. This has widely reduced the use of Personal computers for simple things as it has been replaced by a simple and small
smartphone. In each and every act of a person a mobile is involved in some or the other way. Mobiles were traditionally used for
communicating with people. But now a mobile has replaced the role of a camera, radio, iPod, play stations etc. Mobile devices are
also used for financial transactions by making use of mobile wallets and applications involving online banking. Thus, a mobile
device has almost all every sensitive information about the user. It is very important that the device and the information contained
on the device is secured. Even a simple reckless attitude from the user can result is security attacks as most of the information is
available on the device. In this paper we present the details about Mobile technology, Android operating System, different types of
attacks and the threats recognized by the potentially harmful applications
Key Words: Mobile technology, Android, BYOD, Kernel security, Linux security, Application security, PHA.
Introduction:
Mobile Technology was a mystery few years ago. But now, mobile technology is a noteworthy achievement in the world of
technology. When mobiles were first introduced, they were fundamentally used for calls, SMS and games. But now this rapid
growing technology and portability of the mobile devices has made an evolution into a digital world and made life and
business much easier. The functionalities of a mobile device have been increased. The mobile devices are equipped with
internet connectivity through which one can gain information from anywhere in the world. The mobile has made it possible to
transfer file via Bluetooth and WIFI. It has also made it possible to locate places on the globe and also navigate to the places
using the Global Positioning System (GPS). It is now easy to catch up with the entertainment comfortably from your home.
Mobile technology has its own importance in the business World. With the use of Mobile technology marketers are now able to
sell their products online with ease and comfort. The availability of many Operating systems for smart phones all of which
have their own unique characteristics is the important fact behind the diversity of mobile technology. Android, blackberry,
webos, iOS, Symbian windows are some of the mobile operating systems. The Android operating system developed by google
is the very commonly used operating systems in smart phones which uses simple touch gestures for the operations. Android is
the first and the only open source Operating system with the ability to be ported to any cellphone. Mobiles are very important
in case of emergencies. They have made communication much easier and has been connecting people throughout the world.
Mobile technology has reached miles in a short span. While these devices offer many functionalities and internet connectivity,
they also have security risks. More and more data is generated everyday with the use of mobiles at home, work places, storing,
sharing and accessing huge amount of personal and corporate data. More amount of data will be more danger with mobile
devices. Now-a-days cyberattacks on mobile devices have become more common. There are two may causes of data loss on
mobile devices. Physical device loss and misuse of the mobile applications. The physical devices are not only holding huge
amounts of data but also have our identities attached which when lost can lead to data breach.
Mobile Devices at workplace:
There has been a massive influx of mobile technology into the workplace. And now mobile security is of great importance to
almost every company. Almost all workers access the corporate data from smartphones and tablets. This is nothing but
possessing sensitive information in wrong hands. The policy of Bring your own devices (BYOD) is an increasing trend of
employees bringing their own devices to the workplaces. These devices include smartphones, tablets, laptops and USB drives.
These devices are sometimes sanctioned by the company and some are owned by the employee. Regardless of whether these
devices are supported or not at the workplace, they pose security risks to the organization when connected to the corporate
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1544
network or by accessing corporate data. This leads to corporate data breach. The cost of this is whopping and is estimated to
be increasing more and more every year.
Mobile Device Security:
[1]Over 50% of the business PC’s are mobiles and these devices possess new challenges to network security. So, IT has to
develop its security. A full protection of data on the mobile devices and the network to which it is connected is important. This
is called as Mobile device security. With all the available functionalities, mobile devices are vulnerable and susceptible to
online threats and physical attacks[2]. Security threats to such data could include malware like worms unauthorized access,
spyware, phishing and theft. Surfing the web, booking appointments, setting reminders, sharing files, video calling instant
messaging and mobile banking are few day-to-day activities which possess our personal data and identity and the loss of this
data would have devastating results. So, we need to minimize the exposure of our mobile devices to such threats
Threats:
The following are the few security threats that one should have an eye on.
1. Data breach:
It is the very basic and troublesome threat in almost every field. It is the release of secure and confidential information
to an untrusted person or environment. The attackers will have unauthorized access to databases with sensitive data,
steal the data of the customers or the users contained in those databases. Data breach is a consequence of cyberattack.
By the time you are aware of the data loss the damage is already done.
2. Social Engineering:
It is an attack which involves tricking the people and gaining sensitive information by interacting with the user. Social
engineering is one of the greatest threats Organizations are facing. The data an attacker gains by this is used for
gaining access to the systems and for the carrying out cybercrimes.
3. Wi-Fi interference:
The Network through which a mobile device transmits the data defines the security of the device. A mobile device is as
secure as the network to which it is connected. Connecting to the public networks and open WI-FI networks will lead
to Man-in-the-middle attacks. So, it is very important to know to which network is the device connected and also
ensure if the connected network is safe or not.
4. Out-of-date devices:
When an out of date device is connected to the network it is prone to many inherent risks and security vulnerabilities.
With the changing technologies and the security software and policies it is very important that the mobile device is
updated regularly and is up to date. The extensive use of mobile platforms leads to data breach. Thus, it is important
that the Out-of-date devices are not used.
5. Cryptojacking attacks:
Cryptojacking is an attack wherein an attacker gains Cryptocurrency b illegally mining someone else’s computer. The
victim is forced to click on a malicious link in the email by the hacker. On clicking the link, a crypto mining code is
being loaded on to the victim’s computer. The code auto executes on the victim’s browser. The victim finds no sign of
the attack except the slower performance of the system or lags in execution. Now this attack is on rise. The Percentage
of cryptojacking has been growing as it doesn’t require significant technical skills.
6. Poor password hygiene:
Password provides authorization to the mobile device. It is very important the device is protected with a password as
it is the very basic security feature. It is also important that the password used is a strong one that cannot be easily
identified by brute force. The password should not lead to birthday attack. It is important to maintain a strong and
secure password.
These are the important threats one should be aware of to limit the mobile malware.
Android:
Android is one of the most widely used open source Operating system. It offers an endless combination of software and
hardware. Android was developed on the open Linux Kernel. It was designed to optimize memory and hardware resources in a
mobile environment. It provides access to wide range of useful libraries and tools that can be used to develop applications.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1545
Android is backed by Google. It has layered Security. Each part of the android ecosystem works together to build a strong
defense mechanism. Security starts at the application layer with the built-in malware defense. The google play protect[5]
automatically scans all the apps on Android phones and prevents harmful apps. Regular security updates keep everything in
order.
Overview of Android Security:
1. Kernel Security:
To empower secure communications between the applications running in different processes, an inter process
communication (IPC) facility has been enabled at the operating system level by the Android platform. These security
features at the OS level ensures that the code is the result of comprised application behavior or an exploitation of an
application vulnerability. It is intended to prevent applications from harming the device.
2. Linux Security:
It is the foundation of Android platform. Linux is the stable and secure kernel trusted by many security professionals.
Linux Kernel offers Android with several key features like 1. User based permission model 2. Process seclusion 3.
Extensible mechanism for secure IPC 4. Removal of unnecessary and insecure parts of kernel.
3. System Partition and Safe Mode:
The android Kernel, Operating system libraries, application framework and the applications are included in the
system partition. System partition is in Read only mode. When the safe mode is switched by the user, the third-party
applications can be manually launched by the user but not by default.
4. Cryptography:
A set of cryptographic APIs for the applications have been provided by Android which include AES, RSA, DSA, SHA.
5. Password Protection:
Unauthorized use of the mobile device can be prevented by configuring the Android to authenticate a user specified
password prior to providing access to the device. The cryptographic key for the full filesystem encryption can be
protected by using password.
Application Security:
Any access to sensitive data is available only through protected APIs. If any third-party application that is installed by the user
on the device wishes to share the information accumulated by it can seek the android OS permissions check to protect the
data. Upon installation few applications will request user’s information. Even these requests also pass through the permission
checks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1546
Application Verification:
Android application verification is performed by the google play protect. Users can enable “Verify Apps” and then a user can
perform application installation of verified apps. If the application is found to be bad or malicious then the user can block
installation.
Removing Potentially Harmful Applications (PHA):
PHA’s on the android devices can be detected and removed by google play protect. This is done by the following:
 Online and Offline scans of regularly scheduled and on demand PHA.
 Disabling PHA threats automatically.
 Scanning of the new apps being uploaded into the cloud.
 SafetyNet signal detection.
 Machine learning models.
Even after having many inbuilt security features many PHA have been recorded and the following are the attacks being
recorded by Google play protect.
Attacks:
The following are the attacks caused by the Potentially Harmful Applications which are installed on to the mobile devices.
1.Backdoor:
A backdoor is an unauthorized remote access by the hacker to install malware into the device to exploit the vulnerabilities.
The backdoor virus is hidden and run on the background making it quite difficult to detect. This works making use of DoS
attack. By installing few malicious apps containing the hidden code on to the mobile devices leads to backdoor attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1547
2. Toll fraud:
Toll fraud is also called as VoIP fraud. The hacker takes control of a mobile device, access the phone system and makes
fraudulent calls from the victims account. This fraud is also called as International Revenue Sharing Fraud. The revenue
obtained by the information from the Premium Rate numbers is shared by the International Premium Rate Number providers
and the Fraudsters.
3. Phishing:
By phishing the attacker tries to obtain sensitive information and personal details like Username, Passwords and credit card
details and then attempts a fraud through electronic communications. The attackers after performing phishing will try to
impersonate banks. It is important to download the apps from the authorized vendors to prevent phishing.
4. SMS fraud:
SMS Fraud is nothing but phishing by sending fraudulent SMSs. This is also called Smishing. For example, a fraud sends
message to the victim as if the message is from a bank or from IT department and then lure the victim to call him back.
Smishing by initiating prize money, lottery, job offers etc. which are fraudulent.
5. Click fraud:
Many a times one comes across advertisements while surfing the web. The user is forced to click the advertisement to
continue his work. In this way the user illegally clicks on the website or the advertisement. The Owners of the websites are
paid an amount of money which is determined by the number of clicks or by the number of the visitors who click the ad or
view the website.
6.Spyware:
Any Malware, malicious software or code which is designed to gain access or to damage the computer and steal the browsing
data and sensitive information is called Spyware[4]. Spyware include Adware, Trojans, Keystroke loggers etc. Any spy app on
the mobile device can monitor and record the outgoing and incoming calls, SMSs, MMSs, GPS tracking, Images, Social
networking sites etc.
7. Root exploits:
Rooting an Android device is called root exploits or jailbreaking an iOS device. It is another way that mobile malware uses to
infect devices. Such exploits give a user or application superuser privilege to the attacker which allows him to download all
sorts of applications, many of which are either malware or have been diseased by malware. The attacker is provided with full
access to the device remotely without user knowledge.
Conclusion:
Security solutions for mobile devices and smartphones must defend against viruses, malware, botnets, intrusion attacks,
threats amassed through the deployment of a wide spectrum of mobile applications, and attacks that are specific to mobile
devices.
Due to the explosion of mobile device deployment in the enterprise environment—that those research activities have truly
focused on solving real-world security challenges.
References:
[1]. M. Becher et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices,” Proc. 2011
IEEE Symp. Security and Privacy, IEEE CS, 2011, pp. 96–111.
[2] T. Vidas, D. Votipka, and N. Christin, “All Your Droid Are Belong to Us: A Survey of Current Android Attacks,” Proc. 5th
Usenix Conf. on Offensive Technologies (WOOT 11), Usenix, 2011, pp. 81–90.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1548
[3]T. Luo et al., “Attacks on WebView in the Android System,” Proc. 27th Ann. Computer Security Applications Conf. (ACSAC
11), ACM, 2011, pp. 343–352.
[4]. A. Porter Felt et al., “A Survey of Mobile Malware in the Wild,” Proc. 1st ACM Workshop Security and Privacy in
Smartphones and Mobile Devices (SPSM 11), ACM, 2011, pp. 3–14.
[5]. "Number of Google play store apps 2016 | statistic," Statista, 2014. [Online]. Available:
http://www.statista.com/statistics/266210/number-ofavailable-applications-in-the-google-play-store.
[6]Android Vulnerability Statistics, http://www.cvedetails.com/product/19997/GoogleAndroid.html?vendor_id=1224
[7] Keman Huang, Jia Zhang, Wei Tan, Zhiyong Feng, “An Empirical Analysis of Contemporary Android Mobile Vulnerability
Market” International Conference on Mobile Services IEEE 2015
[8]Android Vulnerability NVD Results
https://web.nvd.nist.gov/view/vuln/searchresults?adv_search=true&cpe=cpe%3A%2Fo%3Agoogle%3Aandroid
[9]OSVDB, https://blog.osvdb.org/category/vulnerability-databases/
[10]CVE-ID Syntex, https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
[11] Darko Hrestak, Stjepan Picek, Željko Rumenjak, “Improving the Android Smartphone Security against Various
Malware Threats” MIPRO 2015, 25- 29 May 2015, Opatija, Croatia.
[12] R.Dhaya, M.Poongodj, “Detecting Software Vulnerabilities in Android Using Static Analysis” 2014 IEEE International
Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
[13] V. Savov, "Only 7.5 percent of Android phones are running marshmallow," The Verge, 2016. [Online]. Available:
http://www.theverge.com/circuitbreaker/2016/5/4/11589630/ android-6-marshmallow-os-distribution-statistics.
[14] "Normal Permissions,". [Online]. Available:
https://developer.android.com/guide/topics/security/normalpermissions.html.
[15] "Dangerous Permissions,". [Online]. Available: https://developer.android.com/guide/topics/security/permissio
ns.html#normal-dangerous.
[16] J.-K. Park and S.-Y. Choi, "Studying security weaknesses of Android system," International Journal of Security and Its
Applications, vol. 9, no. 3, pp. 7–12, Mar. 2015.
[17] "Smartphone users worldwide 2014-2020 | statistic," Statista, 2016. [Online]. Available:
https://www.statista.com/statistics/330695/number-ofsmartphone-users-worldwide.
[18]Jeon, Woongryul, et al. "A practical analysis of smartphone security." Human Interface and the Management of
Information. Interacting with Information. Springer Berlin Heidelberg, 2011. 311-320.
[19] Mylonas, Alexios, et al. "Smartphone security evaluation the malware attack case." Security and Cryptography (SECRYPT),
2011 Proceedings of the International Conference on. IEEE, 2011
[20] Enck, William, et al. "A Study of Android Application Security." USENIX security symposium. Vol. 2. 2011.
[21] Lu, Long, et al. "Chex: statically vetting android apps for component hijacking vulnerabilities." Proceedings of the 2012
ACM conference on Computer and communications security. ACM, 2012.

Contenu connexe

Tendances

Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
IRJET- Women Security System using IoT
IRJET-  	  Women Security System using IoTIRJET-  	  Women Security System using IoT
IRJET- Women Security System using IoTIRJET Journal
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 

Tendances (19)

Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
Mobile security
Mobile securityMobile security
Mobile security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
IRJET- Women Security System using IoT
IRJET-  	  Women Security System using IoTIRJET-  	  Women Security System using IoT
IRJET- Women Security System using IoT
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 

Similaire à IRJET- Android Device Attacks and Threats

Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareIRJET Journal
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy onijmnct
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 

Similaire à IRJET- Android Device Attacks and Threats (20)

Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Dernier (20)

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

IRJET- Android Device Attacks and Threats

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1543 ANDROID DEVICE ATTACKS AND THREATS A Manisha Yadav1, Dr. B. Indira Reddy2 1Student, Dept. of Information Technology, Sreenidhi Institute of Science and Technology, Telangana, India 2Professor, Dept. of Information Technology, Sreenidhi Institute of Science and Technology, Telangana, India -----------------------------------------------------------------------***------------------------------------------------------------------------ Abstract: In this modern era, people believe that a mobile is everything. Each and every person has a mobile phone most preferably a smart phone. Anything and everything available on the web can be accessed from anywhere by anyone possessing a smartphone. This has widely reduced the use of Personal computers for simple things as it has been replaced by a simple and small smartphone. In each and every act of a person a mobile is involved in some or the other way. Mobiles were traditionally used for communicating with people. But now a mobile has replaced the role of a camera, radio, iPod, play stations etc. Mobile devices are also used for financial transactions by making use of mobile wallets and applications involving online banking. Thus, a mobile device has almost all every sensitive information about the user. It is very important that the device and the information contained on the device is secured. Even a simple reckless attitude from the user can result is security attacks as most of the information is available on the device. In this paper we present the details about Mobile technology, Android operating System, different types of attacks and the threats recognized by the potentially harmful applications Key Words: Mobile technology, Android, BYOD, Kernel security, Linux security, Application security, PHA. Introduction: Mobile Technology was a mystery few years ago. But now, mobile technology is a noteworthy achievement in the world of technology. When mobiles were first introduced, they were fundamentally used for calls, SMS and games. But now this rapid growing technology and portability of the mobile devices has made an evolution into a digital world and made life and business much easier. The functionalities of a mobile device have been increased. The mobile devices are equipped with internet connectivity through which one can gain information from anywhere in the world. The mobile has made it possible to transfer file via Bluetooth and WIFI. It has also made it possible to locate places on the globe and also navigate to the places using the Global Positioning System (GPS). It is now easy to catch up with the entertainment comfortably from your home. Mobile technology has its own importance in the business World. With the use of Mobile technology marketers are now able to sell their products online with ease and comfort. The availability of many Operating systems for smart phones all of which have their own unique characteristics is the important fact behind the diversity of mobile technology. Android, blackberry, webos, iOS, Symbian windows are some of the mobile operating systems. The Android operating system developed by google is the very commonly used operating systems in smart phones which uses simple touch gestures for the operations. Android is the first and the only open source Operating system with the ability to be ported to any cellphone. Mobiles are very important in case of emergencies. They have made communication much easier and has been connecting people throughout the world. Mobile technology has reached miles in a short span. While these devices offer many functionalities and internet connectivity, they also have security risks. More and more data is generated everyday with the use of mobiles at home, work places, storing, sharing and accessing huge amount of personal and corporate data. More amount of data will be more danger with mobile devices. Now-a-days cyberattacks on mobile devices have become more common. There are two may causes of data loss on mobile devices. Physical device loss and misuse of the mobile applications. The physical devices are not only holding huge amounts of data but also have our identities attached which when lost can lead to data breach. Mobile Devices at workplace: There has been a massive influx of mobile technology into the workplace. And now mobile security is of great importance to almost every company. Almost all workers access the corporate data from smartphones and tablets. This is nothing but possessing sensitive information in wrong hands. The policy of Bring your own devices (BYOD) is an increasing trend of employees bringing their own devices to the workplaces. These devices include smartphones, tablets, laptops and USB drives. These devices are sometimes sanctioned by the company and some are owned by the employee. Regardless of whether these devices are supported or not at the workplace, they pose security risks to the organization when connected to the corporate
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1544 network or by accessing corporate data. This leads to corporate data breach. The cost of this is whopping and is estimated to be increasing more and more every year. Mobile Device Security: [1]Over 50% of the business PC’s are mobiles and these devices possess new challenges to network security. So, IT has to develop its security. A full protection of data on the mobile devices and the network to which it is connected is important. This is called as Mobile device security. With all the available functionalities, mobile devices are vulnerable and susceptible to online threats and physical attacks[2]. Security threats to such data could include malware like worms unauthorized access, spyware, phishing and theft. Surfing the web, booking appointments, setting reminders, sharing files, video calling instant messaging and mobile banking are few day-to-day activities which possess our personal data and identity and the loss of this data would have devastating results. So, we need to minimize the exposure of our mobile devices to such threats Threats: The following are the few security threats that one should have an eye on. 1. Data breach: It is the very basic and troublesome threat in almost every field. It is the release of secure and confidential information to an untrusted person or environment. The attackers will have unauthorized access to databases with sensitive data, steal the data of the customers or the users contained in those databases. Data breach is a consequence of cyberattack. By the time you are aware of the data loss the damage is already done. 2. Social Engineering: It is an attack which involves tricking the people and gaining sensitive information by interacting with the user. Social engineering is one of the greatest threats Organizations are facing. The data an attacker gains by this is used for gaining access to the systems and for the carrying out cybercrimes. 3. Wi-Fi interference: The Network through which a mobile device transmits the data defines the security of the device. A mobile device is as secure as the network to which it is connected. Connecting to the public networks and open WI-FI networks will lead to Man-in-the-middle attacks. So, it is very important to know to which network is the device connected and also ensure if the connected network is safe or not. 4. Out-of-date devices: When an out of date device is connected to the network it is prone to many inherent risks and security vulnerabilities. With the changing technologies and the security software and policies it is very important that the mobile device is updated regularly and is up to date. The extensive use of mobile platforms leads to data breach. Thus, it is important that the Out-of-date devices are not used. 5. Cryptojacking attacks: Cryptojacking is an attack wherein an attacker gains Cryptocurrency b illegally mining someone else’s computer. The victim is forced to click on a malicious link in the email by the hacker. On clicking the link, a crypto mining code is being loaded on to the victim’s computer. The code auto executes on the victim’s browser. The victim finds no sign of the attack except the slower performance of the system or lags in execution. Now this attack is on rise. The Percentage of cryptojacking has been growing as it doesn’t require significant technical skills. 6. Poor password hygiene: Password provides authorization to the mobile device. It is very important the device is protected with a password as it is the very basic security feature. It is also important that the password used is a strong one that cannot be easily identified by brute force. The password should not lead to birthday attack. It is important to maintain a strong and secure password. These are the important threats one should be aware of to limit the mobile malware. Android: Android is one of the most widely used open source Operating system. It offers an endless combination of software and hardware. Android was developed on the open Linux Kernel. It was designed to optimize memory and hardware resources in a mobile environment. It provides access to wide range of useful libraries and tools that can be used to develop applications.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1545 Android is backed by Google. It has layered Security. Each part of the android ecosystem works together to build a strong defense mechanism. Security starts at the application layer with the built-in malware defense. The google play protect[5] automatically scans all the apps on Android phones and prevents harmful apps. Regular security updates keep everything in order. Overview of Android Security: 1. Kernel Security: To empower secure communications between the applications running in different processes, an inter process communication (IPC) facility has been enabled at the operating system level by the Android platform. These security features at the OS level ensures that the code is the result of comprised application behavior or an exploitation of an application vulnerability. It is intended to prevent applications from harming the device. 2. Linux Security: It is the foundation of Android platform. Linux is the stable and secure kernel trusted by many security professionals. Linux Kernel offers Android with several key features like 1. User based permission model 2. Process seclusion 3. Extensible mechanism for secure IPC 4. Removal of unnecessary and insecure parts of kernel. 3. System Partition and Safe Mode: The android Kernel, Operating system libraries, application framework and the applications are included in the system partition. System partition is in Read only mode. When the safe mode is switched by the user, the third-party applications can be manually launched by the user but not by default. 4. Cryptography: A set of cryptographic APIs for the applications have been provided by Android which include AES, RSA, DSA, SHA. 5. Password Protection: Unauthorized use of the mobile device can be prevented by configuring the Android to authenticate a user specified password prior to providing access to the device. The cryptographic key for the full filesystem encryption can be protected by using password. Application Security: Any access to sensitive data is available only through protected APIs. If any third-party application that is installed by the user on the device wishes to share the information accumulated by it can seek the android OS permissions check to protect the data. Upon installation few applications will request user’s information. Even these requests also pass through the permission checks.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1546 Application Verification: Android application verification is performed by the google play protect. Users can enable “Verify Apps” and then a user can perform application installation of verified apps. If the application is found to be bad or malicious then the user can block installation. Removing Potentially Harmful Applications (PHA): PHA’s on the android devices can be detected and removed by google play protect. This is done by the following:  Online and Offline scans of regularly scheduled and on demand PHA.  Disabling PHA threats automatically.  Scanning of the new apps being uploaded into the cloud.  SafetyNet signal detection.  Machine learning models. Even after having many inbuilt security features many PHA have been recorded and the following are the attacks being recorded by Google play protect. Attacks: The following are the attacks caused by the Potentially Harmful Applications which are installed on to the mobile devices. 1.Backdoor: A backdoor is an unauthorized remote access by the hacker to install malware into the device to exploit the vulnerabilities. The backdoor virus is hidden and run on the background making it quite difficult to detect. This works making use of DoS attack. By installing few malicious apps containing the hidden code on to the mobile devices leads to backdoor attack.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1547 2. Toll fraud: Toll fraud is also called as VoIP fraud. The hacker takes control of a mobile device, access the phone system and makes fraudulent calls from the victims account. This fraud is also called as International Revenue Sharing Fraud. The revenue obtained by the information from the Premium Rate numbers is shared by the International Premium Rate Number providers and the Fraudsters. 3. Phishing: By phishing the attacker tries to obtain sensitive information and personal details like Username, Passwords and credit card details and then attempts a fraud through electronic communications. The attackers after performing phishing will try to impersonate banks. It is important to download the apps from the authorized vendors to prevent phishing. 4. SMS fraud: SMS Fraud is nothing but phishing by sending fraudulent SMSs. This is also called Smishing. For example, a fraud sends message to the victim as if the message is from a bank or from IT department and then lure the victim to call him back. Smishing by initiating prize money, lottery, job offers etc. which are fraudulent. 5. Click fraud: Many a times one comes across advertisements while surfing the web. The user is forced to click the advertisement to continue his work. In this way the user illegally clicks on the website or the advertisement. The Owners of the websites are paid an amount of money which is determined by the number of clicks or by the number of the visitors who click the ad or view the website. 6.Spyware: Any Malware, malicious software or code which is designed to gain access or to damage the computer and steal the browsing data and sensitive information is called Spyware[4]. Spyware include Adware, Trojans, Keystroke loggers etc. Any spy app on the mobile device can monitor and record the outgoing and incoming calls, SMSs, MMSs, GPS tracking, Images, Social networking sites etc. 7. Root exploits: Rooting an Android device is called root exploits or jailbreaking an iOS device. It is another way that mobile malware uses to infect devices. Such exploits give a user or application superuser privilege to the attacker which allows him to download all sorts of applications, many of which are either malware or have been diseased by malware. The attacker is provided with full access to the device remotely without user knowledge. Conclusion: Security solutions for mobile devices and smartphones must defend against viruses, malware, botnets, intrusion attacks, threats amassed through the deployment of a wide spectrum of mobile applications, and attacks that are specific to mobile devices. Due to the explosion of mobile device deployment in the enterprise environment—that those research activities have truly focused on solving real-world security challenges. References: [1]. M. Becher et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices,” Proc. 2011 IEEE Symp. Security and Privacy, IEEE CS, 2011, pp. 96–111. [2] T. Vidas, D. Votipka, and N. Christin, “All Your Droid Are Belong to Us: A Survey of Current Android Attacks,” Proc. 5th Usenix Conf. on Offensive Technologies (WOOT 11), Usenix, 2011, pp. 81–90.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1548 [3]T. Luo et al., “Attacks on WebView in the Android System,” Proc. 27th Ann. Computer Security Applications Conf. (ACSAC 11), ACM, 2011, pp. 343–352. [4]. A. Porter Felt et al., “A Survey of Mobile Malware in the Wild,” Proc. 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices (SPSM 11), ACM, 2011, pp. 3–14. [5]. "Number of Google play store apps 2016 | statistic," Statista, 2014. [Online]. Available: http://www.statista.com/statistics/266210/number-ofavailable-applications-in-the-google-play-store. [6]Android Vulnerability Statistics, http://www.cvedetails.com/product/19997/GoogleAndroid.html?vendor_id=1224 [7] Keman Huang, Jia Zhang, Wei Tan, Zhiyong Feng, “An Empirical Analysis of Contemporary Android Mobile Vulnerability Market” International Conference on Mobile Services IEEE 2015 [8]Android Vulnerability NVD Results https://web.nvd.nist.gov/view/vuln/searchresults?adv_search=true&cpe=cpe%3A%2Fo%3Agoogle%3Aandroid [9]OSVDB, https://blog.osvdb.org/category/vulnerability-databases/ [10]CVE-ID Syntex, https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures [11] Darko Hrestak, Stjepan Picek, Željko Rumenjak, “Improving the Android Smartphone Security against Various Malware Threats” MIPRO 2015, 25- 29 May 2015, Opatija, Croatia. [12] R.Dhaya, M.Poongodj, “Detecting Software Vulnerabilities in Android Using Static Analysis” 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). [13] V. Savov, "Only 7.5 percent of Android phones are running marshmallow," The Verge, 2016. [Online]. Available: http://www.theverge.com/circuitbreaker/2016/5/4/11589630/ android-6-marshmallow-os-distribution-statistics. [14] "Normal Permissions,". [Online]. Available: https://developer.android.com/guide/topics/security/normalpermissions.html. [15] "Dangerous Permissions,". [Online]. Available: https://developer.android.com/guide/topics/security/permissio ns.html#normal-dangerous. [16] J.-K. Park and S.-Y. Choi, "Studying security weaknesses of Android system," International Journal of Security and Its Applications, vol. 9, no. 3, pp. 7–12, Mar. 2015. [17] "Smartphone users worldwide 2014-2020 | statistic," Statista, 2016. [Online]. Available: https://www.statista.com/statistics/330695/number-ofsmartphone-users-worldwide. [18]Jeon, Woongryul, et al. "A practical analysis of smartphone security." Human Interface and the Management of Information. Interacting with Information. Springer Berlin Heidelberg, 2011. 311-320. [19] Mylonas, Alexios, et al. "Smartphone security evaluation the malware attack case." Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on. IEEE, 2011 [20] Enck, William, et al. "A Study of Android Application Security." USENIX security symposium. Vol. 2. 2011. [21] Lu, Long, et al. "Chex: statically vetting android apps for component hijacking vulnerabilities." Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012.