Analyzing the Various Level of Security Threats Within the Android Mobile Operating System
Document Type
Conference Proceeding
Publication Date
3-25-2012
School
Computing Sciences and Computer Engineering
Abstract
The rapid proliferation of Smart Phones have made it prone to attack more than regular PCs. Out of the three main smart phone operating systems, the largest security breach to date was on the Android operating system through the Android App Market. This paper explores the severity of security breach caused by the installation of malicious apps that are concealed as a valid app. We review the apps based on various critera such as the programming proficiency required, level of access control obtainable through the apps, transparency of execution, and the amount of threat it poses. The result from the analysis can be used to develop an effective smart phone security app that not only detect existing malicious code but also prevent it to infect Android phones.
Publication Title
Proceedings of the 2012 IEMS Conference
First Page
80
Last Page
85
Recommended Citation
Moore, J.,
Ali, D.,
Kackley, J.,
Wahjudi, P.
(2012). Analyzing the Various Level of Security Threats Within the Android Mobile Operating System. Proceedings of the 2012 IEMS Conference, 80-85.
Available at: https://aquila.usm.edu/fac_pubs/20552
COinS