Comparative analysis of Android and iOS from security viewpoint

Computer Science Review - Tập 40 - Trang 100372 - 2021
Shivi Garg1,2, Niyati Baliyan2
1Faculty of Computer Engineering, J.C. Bose University of Science and Technology, YMCA, Faridabad, India
2Information Technology Department, Indira Gandhi Delhi Technical University for Women, Delhi, India

Tài liệu tham khảo

O’Dea, 2020 2020 Tung, 2020 Clement, 2020 Hidhaya, 2017, Detection of vulnerabilities caused by webview exploitation in smartphone, 357 Zhang, 2018 Ahvanooey, 2020 Talal, 2019, Comprehensive review and analysis of anti-malware apps for smartphones, Telecommun. Syst., 72, 285, 10.1007/s11235-019-00575-7 Shrestha, 2015, Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware, IEEE Trans. Inf. Forensics Secur., 10, 2270, 10.1109/TIFS.2015.2436364 Lee, 2013, Assessment of malicious applications using permissions and enhanced user interfaces on android, 270 Rashidi, 2015, A survey of Android security threats and defenses, JoWUA, 6, 3 Cho, 2015, A strengthened Android signature management method, KSII Trans. Internet Inform. Syst., 9 Szongott, 2012, Evaluating the threat of epidemic mobile malware, 443 Teufl, 2013, Mobile device encryption systems, 203 Salerno, 2011, Exploration of attacks on current generation smartphones, Procedia Comput. Sci., 5, 546, 10.1016/j.procs.2011.07.071 Zdziarski, 2014, Identifying back doors attack points and surveillance mechanisms in iOS devices, Digit. Invest., 11, 3, 10.1016/j.diin.2014.01.001 Wang, 2017 Grønli, 2014, Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS, 635 Loftus, 2017 Diaz, 2020 Davi, 2011, Privilege escalation attacks on android, 346 Bhatt, 2017, Comparison of static and dynamic analyzer tools for iOS applications, Wirel. Pers. Commun., 96, 4013, 10.1007/s11277-017-4366-1 Werthmann, 2013, PSiOS: bring your own privacy & security to iOS devices, 13 T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryption: Information leakage through unencrypted metadata, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1–7. Shen, 2017, Enhancing data security of iOS client by encryption algorithm, 366 MacDuffie, 2016, Comparing android app permissions, 57 Lutaaya, 2018, Rethinking app permissions on iOS, 1 Pieterse, 2018, Detecting manipulated smartphone data on Android and iOS devices, 89 Opoku, 2016, Security evaluation of the smartphone platforms: A case study with Android, iOS and Windows phones, Asian J. Math. Comput. Res., 234 Kumar, 2019, On cloud security requirements, threats, vulnerabilities and countermeasures: A survey, Comp. Sci. Rev., 33, 1, 10.1016/j.cosrev.2019.05.002 Garg, 2019, Analysis of software vulnerability classification based on different technical parameters, Inform. Secur. J.: Glob. Perspect., 28, 1 2020 Popescu, 2018, The influence of vulnerabilities on the information systems and methods of prevention, Int. J. Inform. Secur. Cybercrime (IJISC), 7, 25 Chakkaravarthy, 2019, A survey on malware analysis and mitigation techniques, Comp. Sci. Rev., 32, 1, 10.1016/j.cosrev.2019.01.002 Yan, 2018, A survey on dynamic mobile malware detection, Softw. Qual. J., 26, 891, 10.1007/s11219-017-9368-4 A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6) pp. 719–738. Qamar, 2019, Mobile malware attacks: Review, taxonomy & future directions, Future Gener. Comput. Syst., 97, 887, 10.1016/j.future.2019.03.007 Pierazzi, 2020, A data-driven characterization of modern Android Spyware, ACM Trans. Manage. Inform. Syst. (TMIS), 11, 1, 10.1145/3382158 Lim, 2016, Structural analysis of packing schemes for extracting hidden codes in mobile malware, EURASIP J. Wireless Commun. Networking, 1, 221, 10.1186/s13638-016-0720-3 Clement, 2020 Garg, 2019, A novel parallel classifier scheme for vulnerability detection in android, Comput. Electr. Eng., 77, 12, 10.1016/j.compeleceng.2019.04.019 Garg, 2019, Data on vulnerability detection in android, Data Brief, 22, 1081, 10.1016/j.dib.2018.12.038 Garg, 2021, Android malware classification using ensemble classifiers