We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)

by Buthaina Mohammed AL-Zadjali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 5
Year of Publication: 2015
Authors: Buthaina Mohammed AL-Zadjali
10.5120/ijca2015907005

Buthaina Mohammed AL-Zadjali . A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach). International Journal of Computer Applications. 130, 5 ( November 2015), 38-42. DOI=10.5120/ijca2015907005

@article{ 10.5120/ijca2015907005,
author = { Buthaina Mohammed AL-Zadjali },
title = { A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach) },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 5 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number5/23208-2015907005/ },
doi = { 10.5120/ijca2015907005 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:35.587385+05:30
%A Buthaina Mohammed AL-Zadjali
%T A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 5
%P 38-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Android platform is an open source operating system, which is widely used on Smartphones. Android operating system usage and adaptation is rapidly increasing with a variety of applications. It also, allows developers to freely access and modifies source code. The open nature of the Android platform attracts attackers to do different types of criminal activities. The android users likely to install and download many applications which can be contain malicious code written by software hackers. The purpose of this paper is to explore the most significant security threats and vulnerabilities in the Android Operating System.

References
  1. Android Developers, Android Developers Jelly Bean.Availableat:http://developer.android.com/about/index.html.
  2. Edwards, J., 2014. Global Smartphone in the Market.Availableat:http://www.businessinsider.com/iphone-v-android-market-share-2014-5.
  3. G. Delac, M.S. and J.K., 2011. Emerging Security Threats for Mobile Platforms,
  4. Heger, D., 2012. Mobile Devices-An Introduction to the Android Operating Environment Design, Architecture, and Performance Implications. DHTechnologies (DHT), retrieved March, pp.1–6. Available at: http://people.stfx.ca/x2011/x2011bhd/391/m_78_3.pdf.
  5. Hoog,A.,2011.AndroidForensics:Investigation,AnalysisandMobileSecurityforGoogleAndroid,Availableat:http://www.elsevier.com/wps/find/bookdescription.cws_home/725477/description#description.
  6. Jovanovic, Z., 2012. Android Forensic Techniques. , p.20.
  7. Juniper, 2012. 2011 Mobile Threats Report. 2011 Mobile Threats Report, (February), pp.1–23.
  8. Kumar, N. & Haq, M., 2011. Penetration Testing of Android-based Smartphones Naresh Kumar. , (June).
  9. Marko Gargenta, n s t i t u t e u t h o r r e t a i n s f u l l r i g h t s First Edit. A. O. and B. Jepson, ed., O’Reilly Media, Inc.
  10. Nimodia, C. & Deshmukh, H., 2012. Android Operating System. Software Engineering, ISSN, 3(1), pp.10–13. Available at: http://www.bioinfo.in/uploadfiles/13366356953_1_1_SE.pdf.
  11. Shewale,H.etal.,2014.Analysisof Android Vulnerabilities and Modern Exploitation Techniques. Ictactjournals.in, 6948(March), pp.863–867. Available at: http://ictactjournals.in/paper/IJCT_Paper_1_863_to_867.pdf.
  12. Tom Smith, 2013. Android 5.0 Key Lime Pie features, release date with Nexus 10 2 and Nexus5[Rumors].Availableat:http://www.christiantoday.com/article/android.5.0.key.lime.pie.features.release.date.nexus.10.2.nexus.5.rumors/33635.htm.
  13. Vijayan, V., Ludwiniak, R. & McCara, G., 2012. AndroidForensicCapabilityandEvaluationofExtractionTools.,(April).Availableat:http://www.academia.edu/1632597/Android_Forensic_Capability_and_Evaluation_of_Extraction_Tools.
  14. www.cvedetails.com,2015.vulnerabilityonAndroidPhones.Availableat:http://www.cvedetails.com/product/19997GoogleAndroid.html?vendor_id=1224.
Index Terms

Computer Science
Information Sciences

Keywords

Android Smartphone Vulnerabilities Security threats Android Architecture.