Abstract

This work investigates issues and challenges of cyber security, specifically malware targeting mobile devices. Recent advances in technology have provided high CPU power, large storage, broad bandwidth and integrated peripheral devices such as Bluetooth, Wi-Fi, 3G/4G to mobile devices, making them popular computing and communication devices. Mobile malware has been targeting mobile devices more than ever and seems to be shifted from their traditional host, the personal computers, to more vulnerable victims. In this study, we mainly focus on malware for Android-based mobile devices. We analyze and discuss related malware and recognize its trends and challenges. We also present a comprehensive security solution that addresses the security from malware threats.

Highlights

  • The latest breakthroughs in smartphone technology have provided us an “all in one” convenience that the thought of living without them is unimaginable

  • We propose a comprehensive security solution to address most of these threats

  • The cyber-security threats, malware are spread from their traditional hosts desktop computers to smartphones and mobile devices as these devices are more vulnerable and they contain more personal information

Read more

Summary

Introduction

The latest breakthroughs in smartphone technology have provided us an “all in one” convenience that the thought of living without them is unimaginable. The number of mobile malware has dramatically increased during recent years and will continue to grow, targeting the common vulnerabilities in mobile devices such as Android root exploit. Rooting capability that is performed by users in order to bypass permission restrictions, adds another layer of vulnerability to Android devices. Apple platform is considered more secure due to restrictions and limitations that Apple imposes regarding app installation, making it more difficult for malware distribution through iOS devices. Recognizing the prevalent growth of Android malware, in this study, we investigate the mobile security issues, associated vulnerabilities and potential threats to mobile devices.

Related Work
Section A
Firewall
Section C
Experimental Results and Discussions
Conclusion
Funding Information
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call