Research Article

Security Evaluation of IOS and Android

Number: Special Issue-1 December 1, 2016
EN

Security Evaluation of IOS and Android

Abstract

In the race of smartphone operation systems, IOS and Android seem to have the big part of pie. Both platforms have grown more enterprise-friendly since about one decade. Their adaptable functionalities make people' lives easy and give them a reputation in the current competitive technology world. We all have our personal thoughts it comes to features, usability and design. However, what about security? Mobile devices, smartphone operation systems run on, hold valuable, sensitive and classified information or content. So, that increases their attractiveness as targets for cybercriminals. The security of these devices is a growing concern and focus point for smartphone users. Eventually, the security technology of the smartphones becomes one of the prime research and these smartphone vendors have increasingly focused on security in their design efforts. In this paper, factors that influence security within IOS and Android are studied to promote the discussion. Security technologies of IOS and Android are briefly presented. And, varies factors are considered such as methods of application distribution, reduced attack surface, privilege separation, permission-based access control, sandboxing, data encryption, data execution prevention and address space layout randomization, geo-location and auto-erase. Then, brief information is given about malicious apps. Lastly, discussion is concluded to answer that tight question in the light of security models investigation and evidences collected from current life.

Keywords

References

  1. [1] Canalys Report, http://www.canalys.com/newsroom/mobile-device-market-reach-26-billion-units-2016, 2013.
  2. [2] Gartner Report Press Release, http://www.gartner.com/newsroom/id/3270418, 2016.
  3. [3] Gartner Report Press Release, http://www.gartner.com/newsroom/id/2996817, 2015.
  4. [4] Bhattacharya P., Yang L., Guo M., Qian K. and Yang M., Learning Mobile Security with Labware, IEEE Security & Privacy, vol. 12, no. 1, 2014, pp. 69-72.
  5. [5] Al-Qershi F., Al-Qurishi M., Md Mizanur Rahman S. and Al-Amri A., Android vs. iOS: The security battle, Computer Applications and Information Systems (WCCAIS), 2014 World Congress on, Hammamet, 2014, pp. 1-8.
  6. [6] Mohamed I. and Patel D., Android vs. IOS Security: A Comparative Study, Information Technology - New Generations (ITNG), ), 2015 12th International Conference on, Las Vegas, NV, 2015, pp. 725-730.
  7. [7] Li Q. and Clark G., Mobile Security: A Look Ahead, in IEEE Security & Privacy, vol. 11, no. 1, 2013, pp. 78-81.
  8. [8] Nachenberg C., A window into mobile device security, Symantec Security Response, Symantec, 2011, pp.4-9.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Authors

Ahmet Hayran
BAŞKENT ÜNİVERSİTESİ
Türkiye

Muratcan İğdeli This is me
BAŞKENT ÜNİVERSİTESİ, SAĞLIK BİLİMLERİ FAKÜLTESİ, FİZYOTERAPİ VE REHABİLİTASYON BÖLÜMÜ, FİZYOTERAPİ VE REHABİLİTASYON PR. (ÜCRETLİ)
Türkiye

Atif Yılmaz This is me
İHSAN DOĞRAMACI BİLKENT ÜNİVERSİTESİ
Türkiye

Cemal Gemci
BAŞKENT ÜNİVERSİTESİ
Türkiye

Publication Date

December 1, 2016

Submission Date

November 29, 2016

Acceptance Date

December 1, 2016

Published in Issue

Year 2016 Number: Special Issue-1

APA
Hayran, A., İğdeli, M., Yılmaz, A., & Gemci, C. (2016). Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers, Special Issue-1, 258-261. https://doi.org/10.18100/ijamec.270378
AMA
1.Hayran A, İğdeli M, Yılmaz A, Gemci C. Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers. 2016;(Special Issue-1):258-261. doi:10.18100/ijamec.270378
Chicago
Hayran, Ahmet, Muratcan İğdeli, Atif Yılmaz, and Cemal Gemci. 2016. “Security Evaluation of IOS and Android”. International Journal of Applied Mathematics Electronics and Computers, no. Special Issue-1: 258-61. https://doi.org/10.18100/ijamec.270378.
EndNote
Hayran A, İğdeli M, Yılmaz A, Gemci C (December 1, 2016) Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers Special Issue-1 258–261.
IEEE
[1]A. Hayran, M. İğdeli, A. Yılmaz, and C. Gemci, “Security Evaluation of IOS and Android”, International Journal of Applied Mathematics Electronics and Computers, no. Special Issue-1, pp. 258–261, Dec. 2016, doi: 10.18100/ijamec.270378.
ISNAD
Hayran, Ahmet - İğdeli, Muratcan - Yılmaz, Atif - Gemci, Cemal. “Security Evaluation of IOS and Android”. International Journal of Applied Mathematics Electronics and Computers. Special Issue-1 (December 1, 2016): 258-261. https://doi.org/10.18100/ijamec.270378.
JAMA
1.Hayran A, İğdeli M, Yılmaz A, Gemci C. Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers. 2016;:258–261.
MLA
Hayran, Ahmet, et al. “Security Evaluation of IOS and Android”. International Journal of Applied Mathematics Electronics and Computers, no. Special Issue-1, Dec. 2016, pp. 258-61, doi:10.18100/ijamec.270378.
Vancouver
1.Ahmet Hayran, Muratcan İğdeli, Atif Yılmaz, Cemal Gemci. Security Evaluation of IOS and Android. International Journal of Applied Mathematics Electronics and Computers. 2016 Dec. 1;(Special Issue-1):258-61. doi:10.18100/ijamec.270378

Cited By