Review

SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS

Volume: 3 Number: 2 May 1, 2021
EN TR

SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS

Abstract

In the ever developing world of technology, mobile applications are increasing day by day alongside with mobile cyber threats. This fact is valid as a result of shifts from e-government to m-government and classical e-business to m-business solutions. Therefore the electronic structure of government services can be accessed from mobile apps using mobile signatures. The main threat is personal data that can be captured by malicious codes and hence dangerous results can be faced. In this paper, malicious software and security techniques of the mobile applications are analyzed in addition to protection systems from user, developer aspects and even Google Play. The main issue of this paper is providing sets of counter controls for covering vulnerabilities of mobile applications.

Keywords

References

  1. [1] T. Vidas, N. Christin, and L. F. Cranor, Curbing Android Permission Creep, in In Proceedings of the 2011 Web 2.0 Security and Privacy Workshop (W2SP 2011), 2011.
  2. [2] P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, in Proceedings of the 18th ACM conference on Computer and communications security - CCS 11, 2011, p. 627.
  3. [3] Dynamic Analysis vs. Static Analysis, Intel, 2013. [Web]. Retrieved from: https://software.intel.com/sites/products/documentati on/doclib/
  4. [4] Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for Android, Science (80-. )., pp. 1525, 2011
  5. [5] M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, RiskRanker: Scalable and Accurate Zero-day Android Malware Detection, in Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys 12, 2012, pp. 281294.
  6. [6] G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, Paranoid Android: Versatile Protection For Smartphones, in Annual Computer Security Applications Conference (ACSAC), 2010, pp. 347 356.
  7. [7] M. Guido, J. Ondricek, J. Grover, D. Wilburn, T. Nguyen, and A. Hunt, Automated identification of installed malicious Android applications, Digit. Investig., vol. 10, pp. 96104, 2013.
  8. [8] G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware, in Computer Network Security, vol. 7531, I. Kotenko and V. Skormin, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 240 253.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Review

Publication Date

May 1, 2021

Submission Date

December 10, 2020

Acceptance Date

February 3, 2021

Published in Issue

Year 2021 Volume: 3 Number: 2

APA
Efe, A., & Özdamarlar, Ş. (2021). SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS. International Journal of Engineering and Innovative Research, 3(2), 145-162. https://doi.org/10.47933/ijeir.838873
AMA
1.Efe A, Özdamarlar Ş. SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS. IJEIR. 2021;3(2):145-162. doi:10.47933/ijeir.838873
Chicago
Efe, Ahmet, and Şerife Özdamarlar. 2021. “SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS”. International Journal of Engineering and Innovative Research 3 (2): 145-62. https://doi.org/10.47933/ijeir.838873.
EndNote
Efe A, Özdamarlar Ş (May 1, 2021) SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS. International Journal of Engineering and Innovative Research 3 2 145–162.
IEEE
[1]A. Efe and Ş. Özdamarlar, “SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS”, IJEIR, vol. 3, no. 2, pp. 145–162, May 2021, doi: 10.47933/ijeir.838873.
ISNAD
Efe, Ahmet - Özdamarlar, Şerife. “SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS”. International Journal of Engineering and Innovative Research 3/2 (May 1, 2021): 145-162. https://doi.org/10.47933/ijeir.838873.
JAMA
1.Efe A, Özdamarlar Ş. SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS. IJEIR. 2021;3:145–162.
MLA
Efe, Ahmet, and Şerife Özdamarlar. “SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS”. International Journal of Engineering and Innovative Research, vol. 3, no. 2, May 2021, pp. 145-62, doi:10.47933/ijeir.838873.
Vancouver
1.Ahmet Efe, Şerife Özdamarlar. SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS. IJEIR. 2021 May 1;3(2):145-62. doi:10.47933/ijeir.838873

88x31.png

This work is licensed under a Creative Commons Attribution 4.0 International License