Protection Software for Mobile Operating Systems

被引:0
|
作者
Omelchenko, Tatiana [1 ]
Nikishova, Arina [1 ]
Umnitsyn, Mikhail [1 ]
Sadovnikova, Natalia [1 ]
Parygin, Danila [2 ]
Kostyukov, Aleksandr [3 ]
机构
[1] Volgograd State Univ, Dept Informat Secur, Volgograd, Russia
[2] Volgograd State Tech Univ, Dept CAD, Volgograd, Russia
[3] Sevastopol State Univ, Dept Informat Secur, Sevastopol, Russia
关键词
Android OS; Mobile Devices; Permissions; Cloak and Dagger; Vulnerabilities Scanning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat of software viruses aimed at mobile operating systems' segment is growing. This is confirmed by statistic numbers on malware installations. A comparative analysis of mobile operating system is performed. Model of attacking actions detection is suggested. Specific variant of attacking action called Cloak & Dagger is described in details. Algorithm for detecting malicious software packages that perform Cloak & Dagger attack is proposed. Software that implements the algorithm is developed. Therefore experimental studies on a variety of mobile applications are carried out. The results of experimental studies show that taking into account the presence of multiple permissions in the application does not allow to identify all potentially dangerous applications in mobile operating system.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [21] Performability Modeling of mobile software systems
    Bracchi, P
    Cukic, B
    Cortellessa, V
    15TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2004, : 77 - 88
  • [22] Studying thermal protection for mobile sensor operating in combustion environment
    Korhonen, Ilkka
    Ahola, Jero
    MEASUREMENT, 2019, 145 : 594 - 599
  • [23] Reliability Analysis of Operating Systems and Software Stack for Embedded Systems
    Santini, Thiago
    Carro, Luigi
    Wagner, Flavio Rech
    Rech, Paolo
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2016, 63 (04) : 2225 - 2232
  • [24] Usable mandatory integrity protection for operating systems
    Li, Ninghui
    Mao, Ziqing
    Chen, Hong
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 164 - +
  • [25] PRIVACY AND PROTECTION IN OPERATING SYSTEMS - WORKSHOP REPORT
    BRANSTAN, DK
    COMPUTER, 1973, 6 (01) : 43 - 46
  • [26] How secure are current mobile operating systems?
    Murmann, T
    Rossnagel, H
    Communications and Multimedia Security, 2005, 175 : 47 - 58
  • [27] Privacy Requirements Patterns for Mobile Operating Systems
    Xuan, Xiao
    Wang, Ye
    Li, Shanping
    2014 IEEE 4TH INTERNATIONAL WORKSHOP ON REQUIREMENTS (REPA), 2014, : 39 - 42
  • [28] vMobiDesk: Desktop Virtualization for Mobile Operating Systems
    Su, Kui
    Liu, Peiyu
    Gu, Liang
    Chen, Wenzhi
    Hwang, Kai
    Yu, Zhibin
    IEEE ACCESS, 2020, 8 : 213541 - 213553
  • [29] Software Tools for Low-Level Software and Operating Systems Classes
    Walter, Maxwell
    Karlsson, Sven
    WCAE'17: PROCEEDINGS OF THE 19TH WORKSHOP ON COMPUTER ARCHITECTURE EDUCATION, 2017, : 16 - 23
  • [30] EIMOS: Enhancing Interactivity in Mobile Operating Systems
    Bae, Sunwook
    Song, Hokwon
    Min, Changwoo
    Kim, Jeehong
    Eom, Young Ik
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2012, PT III, 2012, 7335 : 238 - 247