Android Mobile Security - Threats and Protection

被引:0
|
作者
Mu, Jiayi [1 ]
Cui, Ailing [1 ]
Rao, Jingyu [1 ]
机构
[1] Univ Southern Polytech State Univ, Dept Comp Sci, Marietta, GA 30060 USA
关键词
Mobile Security; Smart Phone;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, more and more users and businesses use smart phone as communication tools, but also use in our private life. In the meantime, hackers use the network exploits to attack users' smart phone. These attacks exploit weaknesses come from different kinds of access just like SMS, Wi-Fi networks and MMS. Here, we will show eight modules, which cover important mobile threats in most aspects of mobile security. Each module focuses on one type of mobile threats, such as Spyware, SMS Spam and Malware, and we will convey the threat analysis and protection in multiple ways. We will provide one lab in each module to explain the solutions that we get.
引用
下载
收藏
页码:683 / 686
页数:4
相关论文
共 50 条
  • [1] Security Threats Analysis for Android based Mobile Device
    Yoon, Seungyong
    Jeon, Yongsung
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 775 - 776
  • [2] Mobile Security: A Look into Android
    Mos, Aaron
    Chowdhury, Md Minhaz
    2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2020, : 638 - 642
  • [3] Teaching Android Mobile Security
    Lalande, Jean-Francois
    Tong, Valerie Viet Triem
    Graux, Pierre
    Hiet, Guillaume
    Mazurczyk, Wojciech
    Chaoui, Habiba
    Berthome, Pascal
    SIGCSE '19: PROCEEDINGS OF THE 50TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2019, : 232 - 238
  • [4] Mobile Security: Threats and Best Practices
    Weichbroth, Pawel
    Lysik, Lukasz
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [5] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121
  • [6] Security Issues and Threats of Mobile Devices
    Vorobyeva, Irina
    Cata, Teuta
    VISION 2020: INNOVATION, DEVELOPMENT SUSTAINABILITY, AND ECONOMIC GROWTH, VOLS 1-3, 2013, : 668 - 674
  • [7] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [8] Information security and threats in mobile appliances
    Tedeschi, Antonio (antonio.tedeschi@uniroma3.it), 1600, Springer (07):
  • [9] Mobile Payment Security, Threats, and Challenges
    Wang, Yong
    Hahn, Christen
    Sutrave, Kruttika
    PROCEEDINGS OF THE 2016 SECOND CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2016,
  • [10] A survey of android mobile platform security
    Zou, Futai
    Zhang, Siyu
    Wan, Tianqi
    Pan, Li
    IET Seminar Digest, 2014, 2014 (03): : 520 - 527