Security assessment of the selected mobile platform

Aleksandra Iwaniuk

aleksandra.kowaluk3@gmail.com
Lublin University of Technology (Poland)

Abstract

Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk for mobile devices and how the Android system tries to protect them. The questionnaire survey checked how the phone screens are blocked and how often changes are made to the blockade. To check if the screen lock can be removed, tests were performed using Google to find the device, as well as Fone. A summary of results was presented and conclusions were drawn.


Keywords:

Android; security; security testing

[1] Drake J.J. Fora P.O. Lanier Z. Mulliner C. Pidley S. A. Wicherski G., Android Podręcznik Hackera, Helion, 2015.
[2] Bing H., Analysis and Research of System Seciurity Based on Android, Fifth International Conference on Intelligent Computation Technology and Automation, 2012
[3] Mu J. Cui A. Rao J., Android Mobile Security – Threats and Protection, International Conference on Computer, Network and Communication Engineering, 2013.
[4] Wu X. Li X, Hack Android Application and Defence, 3rd International Conference on Computer Science and Network Technology, 2013.
[5] Weidman G., Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne, Helion, 2015.
[6] Rashidi B. Fung C., A Survey of Android Security Threats and Defenses, ResearchGate, 2015.
[7] Fang Z. Han W. Li Y., Permission based Android security: Issues and countermeasures, Research Collection School Of Information Systems, 2014.
[8] Delac G. Silic M. Krolo J., Emerging Security Threats for Mobile Platforms, Faculty of Electrical Engineering and Computing.
[9] Gunasekera S., Android Apps Security, Apress, 2012.
[10] Holla S. Katti M.M., Android based mobile application development and its serciurity, Inernational Journal of Computer Trends and Technology, 2012.
[11] Liebergeld S. Lange M., Android Security, Pitfalls, Lessons Learned and BYOD, 2013.
[12] https://www.spidersweb.pl/2018/02/android-ios-udzialyrynkowe.html
Download


Published
2018-12-30

Cited by

Iwaniuk, A. (2018). Security assessment of the selected mobile platform . Journal of Computer Sciences Institute, 9, 302–307. https://doi.org/10.35784/jcsi.216

Authors

Aleksandra Iwaniuk 
aleksandra.kowaluk3@gmail.com
Lublin University of Technology Poland

Statistics

Abstract views: 231
PDF downloads: 158