Abstract

Vulnerability Analysis of Smart Phone and Tablet Operating Systems

Highlights

  • Mobile phones, when discovered, used to be relatively larger and only sent text messages together with making voice calls, and shrunk in size with improvements in microprocessor and chip technology, but became more functional in terms of added features

  • A new database was created by querying security vulnerabilities of the most preferred operating systems on smart phones and tablets from National Vulnerability Database of the US and CVEDETAILS

  • The vulnerability data were acquired from the database developed by National Institute of Standards and Technology (NIST) and CVEDETAILS

Read more

Summary

Introduction

Mobile phones, when discovered, used to be relatively larger and only sent text messages together with making voice calls, and shrunk in size with improvements in microprocessor and chip technology, but became more functional in terms of added features. Almost all the operations, which can be done via a desktop computer, could be done through smart phones and tablets, on the basis of basic functions. The number of broadband internet subscribers in Turkey, which was 6 million in 2008, increased by nearly eight times to 48.6 million as of September 2015. Considering the available data, it is expected that the number of users and households connected to the internet will increase each day. Parallel to this increase in the number of users and devices, the security risks that may arise are expected to increase gradually

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.