Abstract

The paper aims to examine publicly available vulnerability databases and their systems for assessing the severity of damage that can be caused by malware targeting mobile devices running Android or iOS. The second goal of the study is to evaluate the vulnerability detection capabilities associated with a specific version of a mobile operating system. Methods used: comparative analysis and summary. Based on the results of the application of the comparative analysis, it is established which of the national databases have better capabilities to filter the data and obtain adequate results when searching for vulnerabilities for mobile devices.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.