INVESTIGATION OF ATTACK TYPES IN ANDROID OPERATING SYSTEM
Abstract
With the widespread use of mobile technologies, the importance of cybersecurity is increasing in our country as well as all over the world. Android operating system-based smartphones and tablets used in mobile technologies are frequently in use for communication, social networking, banking, and payment transactions and become an important part of developing technology. Although the Android operating system is among the most popular operating systems, one of the biggest challenges faced by android users and developers is to ensure the security of the operating system. In this research, the security mechanism was examined with the android operating system architecture, and the exploitation of android vulnerabilities scenarios was created. These scenarios were carried out on various examples using the Smart Pentester Framework (SPF) tool. Also, by examining the sources in the literature, exploitations of android vulnerabilities are classified into categories. Based on the created classification and the exploitation methods scenarios taking place in the virtual environment built on Kali Linux, it is aimed to raise awareness of android operating system users and developers against possible risks.
Keywords
References
- [1] Kim, D., Shin, D., Shin, D., & Kim, Y. H. (2019). Attack detection application with attack tree for mobile system using log analysis. Mobile Networks and Applications, 24(1), 184-192.
- [2] Stergiopoulos, G., Gritzalis, D., Vasilellis, E., & Anagnostopoulou, A. (2021). Dropping malware through sound injection: A comparative analysis on Android operating systems. Computers & Security, 105, 102228
- [3] Liu, X., Du, X., Zhang, X., Zhu, Q., Wang, H., & Guizani, M. (2019), Adversarial Samples on Android Malware Detection Systems for IoT Systems. Sensors, 19(4).
- [4] Sheikh H., Cyril C., Thomas O., (2019), An analysis of the robutness and stability of the network stack in symbian based smartphones , Vol No 10.
- [5] Moore, S. R., Ge, H., Li, N., & Proctor, R. W. (2019). Cybersecurity for android a applications: Permissions in android 5 and 6. International Journal of Human–Computer Interaction, 35(7), 630-640.
- [6] Kumar, S., & Shukla, S. K. (2020). The state of Android security. In Cyber Security in India (pp. 17-22). Springer, Singapore.
- [7] Li, C., Mills, K., Niu, D., Zhu, R., Zhang, H., & Kinawi, H. (2019). Android malware detection based on factorization machine. IEEE Access, 7, 184008-184019.
- [8] Martín, A., Lara-Cabrera, R., & Camacho, D. (2019). Android malware detection through hybrid features fusion and ensemble classifiers: The AndroPyTool framework and the OmniDroid dataset. Information Fusion, 52, 128-142.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Publication Date
June 30, 2021
Submission Date
January 9, 2021
Acceptance Date
June 28, 2021
Published in Issue
Year 2021 Number: 046