Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis of Android Vulnerabilities and Modern Exploitation Techniques


Affiliations
1 MS (Cyber Laws and Information Security) Division, Indian Institute of Information Technology, Allahabad, India
     

   Subscribe/Renew Journal


Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

Keywords

Android, Vulnerability, Exploit, Malware, Linux Kernel.
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 248

PDF Views: 0




  • Analysis of Android Vulnerabilities and Modern Exploitation Techniques

Abstract Views: 248  |  PDF Views: 0

Authors

Himanshu Shewale
MS (Cyber Laws and Information Security) Division, Indian Institute of Information Technology, Allahabad, India
Sameer Patil
MS (Cyber Laws and Information Security) Division, Indian Institute of Information Technology, Allahabad, India
Vaibhav Deshmukh
MS (Cyber Laws and Information Security) Division, Indian Institute of Information Technology, Allahabad, India
Pragya Singh
MS (Cyber Laws and Information Security) Division, Indian Institute of Information Technology, Allahabad, India

Abstract


Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

Keywords


Android, Vulnerability, Exploit, Malware, Linux Kernel.