Comparative analysis of Android and iOS from security viewpoint
Tài liệu tham khảo
O’Dea, 2020
2020
Tung, 2020
Clement, 2020
Hidhaya, 2017, Detection of vulnerabilities caused by webview exploitation in smartphone, 357
Zhang, 2018
Ahvanooey, 2020
Talal, 2019, Comprehensive review and analysis of anti-malware apps for smartphones, Telecommun. Syst., 72, 285, 10.1007/s11235-019-00575-7
Shrestha, 2015, Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware, IEEE Trans. Inf. Forensics Secur., 10, 2270, 10.1109/TIFS.2015.2436364
Lee, 2013, Assessment of malicious applications using permissions and enhanced user interfaces on android, 270
Rashidi, 2015, A survey of Android security threats and defenses, JoWUA, 6, 3
Cho, 2015, A strengthened Android signature management method, KSII Trans. Internet Inform. Syst., 9
Szongott, 2012, Evaluating the threat of epidemic mobile malware, 443
Teufl, 2013, Mobile device encryption systems, 203
Salerno, 2011, Exploration of attacks on current generation smartphones, Procedia Comput. Sci., 5, 546, 10.1016/j.procs.2011.07.071
Zdziarski, 2014, Identifying back doors attack points and surveillance mechanisms in iOS devices, Digit. Invest., 11, 3, 10.1016/j.diin.2014.01.001
Wang, 2017
Grønli, 2014, Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS, 635
Loftus, 2017
Diaz, 2020
Davi, 2011, Privilege escalation attacks on android, 346
Bhatt, 2017, Comparison of static and dynamic analyzer tools for iOS applications, Wirel. Pers. Commun., 96, 4013, 10.1007/s11277-017-4366-1
Werthmann, 2013, PSiOS: bring your own privacy & security to iOS devices, 13
T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryption: Information leakage through unencrypted metadata, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1–7.
Shen, 2017, Enhancing data security of iOS client by encryption algorithm, 366
MacDuffie, 2016, Comparing android app permissions, 57
Lutaaya, 2018, Rethinking app permissions on iOS, 1
Pieterse, 2018, Detecting manipulated smartphone data on Android and iOS devices, 89
Opoku, 2016, Security evaluation of the smartphone platforms: A case study with Android, iOS and Windows phones, Asian J. Math. Comput. Res., 234
Kumar, 2019, On cloud security requirements, threats, vulnerabilities and countermeasures: A survey, Comp. Sci. Rev., 33, 1, 10.1016/j.cosrev.2019.05.002
Garg, 2019, Analysis of software vulnerability classification based on different technical parameters, Inform. Secur. J.: Glob. Perspect., 28, 1
2020
Popescu, 2018, The influence of vulnerabilities on the information systems and methods of prevention, Int. J. Inform. Secur. Cybercrime (IJISC), 7, 25
Chakkaravarthy, 2019, A survey on malware analysis and mitigation techniques, Comp. Sci. Rev., 32, 1, 10.1016/j.cosrev.2019.01.002
Yan, 2018, A survey on dynamic mobile malware detection, Softw. Qual. J., 26, 891, 10.1007/s11219-017-9368-4
A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6) pp. 719–738.
Qamar, 2019, Mobile malware attacks: Review, taxonomy & future directions, Future Gener. Comput. Syst., 97, 887, 10.1016/j.future.2019.03.007
Pierazzi, 2020, A data-driven characterization of modern Android Spyware, ACM Trans. Manage. Inform. Syst. (TMIS), 11, 1, 10.1145/3382158
Lim, 2016, Structural analysis of packing schemes for extracting hidden codes in mobile malware, EURASIP J. Wireless Commun. Networking, 1, 221, 10.1186/s13638-016-0720-3
Clement, 2020
Garg, 2019, A novel parallel classifier scheme for vulnerability detection in android, Comput. Electr. Eng., 77, 12, 10.1016/j.compeleceng.2019.04.019
Garg, 2019, Data on vulnerability detection in android, Data Brief, 22, 1081, 10.1016/j.dib.2018.12.038
Garg, 2021, Android malware classification using ensemble classifiers