ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff518c15000000f0fa020001000700
Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

Authors
Himanshu Shewale, Sameer Patil, Vaibhav Deshmukh, Pragya Singh
Indian Institute of Information Technology, Allahabad, India

Keywords
Android, Vulnerability, Exploit, Malware, Linux Kernel
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
301000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 5 , Issue: 1 , Pages: 863 - 867 )
Date of Publication :
March 2014
Page Views :
184
Full Text Views :
8

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.