Android Security Analysis using Mobile Sandbox
نویسندگان
چکیده
منابع مشابه
Enter Sandbox: Android Sandbox Comparison
Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google’s mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number of static and dynamic code analysis platforms for analy...
متن کاملMind Analysis Game Using Android Mobile Technology
Mind analysis game is a game that deals with the training and exercise of the brain. It tests the ability of the player to focus, reason under pressure and makes use of already acquired knowledge in a short period of time. Inactivity of the human mind and the low level of responsiveness of the human brain to stimulus which are prominent in some people, both old and young have been a great chall...
متن کاملMobile network measurements using Android
Introducing a mobile telephony standard requires the cooperation of many engineers. Once implemented the networks require many improvements on the longterm scale. Lots of research is performed at the universities and similar research institutions with limited access to expensive measurement equipment. Introducing the new generations of mobile devices, e.g. smart phones, enables the development ...
متن کاملSecurity Analysis of Android Factory Resets
With hundreds of millions of devices expected to be traded by 20181, flaws in smartphone sanitisation functions could be a serious problem. Trade press reports2 have already raised doubts about the effectiveness of Android “Factory Reset”, but this paper presents the first comprehensive study of the issue. We study the implementation of Factory Reset on 21 Android smartphones from 5 vendors run...
متن کاملFortifying Android Patterns using Persuasive Security Framework
Android Pattern, form of graphical passwords used on Android smartphones, is widely adopted by users. In theory, Android Pattern is more secure than a 5-digit PIN scheme. Users’ graphical passwords, however, are known to be very skewed. They often include predictable shapes (e.g., Z and N), biases in selection of starting point, and predictable sequences of the points that make them easy to gue...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: regular
سال: 2021
ISSN: 2582-760X
DOI: 10.35940/ijdcn.c5015.061321