Protection Software for Mobile Operating Systems

被引:0
|
作者
Omelchenko, Tatiana [1 ]
Nikishova, Arina [1 ]
Umnitsyn, Mikhail [1 ]
Sadovnikova, Natalia [1 ]
Parygin, Danila [2 ]
Kostyukov, Aleksandr [3 ]
机构
[1] Volgograd State Univ, Dept Informat Secur, Volgograd, Russia
[2] Volgograd State Tech Univ, Dept CAD, Volgograd, Russia
[3] Sevastopol State Univ, Dept Informat Secur, Sevastopol, Russia
关键词
Android OS; Mobile Devices; Permissions; Cloak and Dagger; Vulnerabilities Scanning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat of software viruses aimed at mobile operating systems' segment is growing. This is confirmed by statistic numbers on malware installations. A comparative analysis of mobile operating system is performed. Model of attacking actions detection is suggested. Specific variant of attacking action called Cloak & Dagger is described in details. Algorithm for detecting malicious software packages that perform Cloak & Dagger attack is proposed. Software that implements the algorithm is developed. Therefore experimental studies on a variety of mobile applications are carried out. The results of experimental studies show that taking into account the presence of multiple permissions in the application does not allow to identify all potentially dangerous applications in mobile operating system.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [41] Software Reuse of Mobile Systems based on Modelling
    Guo, Ping
    Liu, Ming
    2016 INTERNATIONAL CONFERENCE ON ELECTRONIC, INFORMATION AND COMPUTER ENGINEERING, 2016, 44
  • [42] Managing increasingly software dependent mobile systems
    Jefferies, N
    Irvine, J
    Munro, A
    Moessner, K
    SECOND INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2001, : 247 - 251
  • [43] Agile software development of mobile information systems
    Abrahamsson, Pekka
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2007, 4495 : 1 - 4
  • [44] Alternative mobile agent systems and software environments
    Nygard, KE
    Jian, KD
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 11TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 1998, : 165 - 170
  • [45] Software Architecture for Mobile Cloud Computing Systems
    Alreshidi, Abdulrahman
    Ahmad, Aakash
    Altamimi, Ahmed B.
    Sultan, Khalid
    Mehmood, Rashid
    FUTURE INTERNET, 2019, 11 (11):
  • [46] THEORETICAL ISSUES CONCERNING PROTECTION IN OPERATING SYSTEMS.
    Harrison, Michael A.
    Advances in Computers, 1985, 24 : 61 - 100
  • [47] Time Protection in Operating Systems and Speaker Legitimacy Detection
    Colyer, Adrian
    Queue, 2019, 17 (03): : 38 - 39
  • [48] PROTECTION AND RESOURCE CONTROL IN DISTRIBUTED OPERATING-SYSTEMS
    MULLENDER, SJ
    TANENBAUM, AS
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1984, 8 (5-6): : 421 - 432
  • [49] THEORETICAL ISSUES CONCERNING PROTECTION IN OPERATING-SYSTEMS
    HARRISON, MA
    ADVANCES IN COMPUTERS, 1985, 24 : 61 - 100
  • [50] The Readiness of Mobile Operating Systems for Cloud Computing Services
    Oriaku, Chigozirim
    Alwan, Nahla
    Lami, Ihsan Alshahib
    IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 49 - 55