Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 712))

Abstract

Usage of mobile phones has increased over the years, all over the world. With the extensive usage of smartphones, it has been confirmed by that most of the smartphone users work in an Android platform as it is an open platform which can be used by anyone to develop applications or introduce malicious activities; Reports suggest that up to 85% of the mobile phones used are in Android platform (Portal, Statistics. Number of monthly active Facebook users worldwide as of 1st quarter 2015 (in millions), 2015) [1]. At the least, a smartphone user uses a minimum of 12 applications, which arises the question, “how safe is your mobile?”. This paper focuses on the said problem and provides an insight about some common types of attacks that use the vulnerability in applications and some defense methods and techniques that could be followed to prevent them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Portal, Statistics. “Number of monthly active Facebook users worldwide as of 1st quarter 2015 (in millions).” Luettavissa: http://www.statista.com/statistics/264810/number-ofmonthly-active-facebook-users-worldwide/. Luettu 26 (2015).

  2. Ballagas, Rafael, et al. “Byod: Bring your own device.” Proceedings of the Workshop on Ubiquitous Display Environments,” Ubicomp. Vol. 2004. 2004.

    Google Scholar 

  3. Kang, Joon-Myung, Sinseok Seo, and James Won-Ki Hong. “Usage pattern analysis of smartphones.” Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific. IEEE, 2011.

    Google Scholar 

  4. Kulkarni, Shakuntala P., and Sachin Bojewar. “Vulnerabilities of Smart Phones.” (2015).

    Google Scholar 

  5. Rekanar, Kaavya. “Text Classification of Legitimate and Rogue online Privacy Policies: Manual Analysis and a Machine Learning Experimental Approach.” (2016).

    Google Scholar 

  6. D. Guo, A. Sui, and T. Guo, “A Behavior Analysis Based Mobile Malware Defense System,” Proc. ICSPCS, pp. 16, 2012.

    Google Scholar 

  7. M. Kireet, Dr. Meda Sreenivasa Rao. “Investigation of Collusion Attack Detection in Android Smartphones.” International Journal of Computer Science and Information Security, (IJCSIS) Vol. 14, No. 6, June 2016.

    Google Scholar 

  8. Garera, Sujata, et al. “A framework for detection and measurement of phishing attacks.” Proceedings of the 2007 ACM workshop on Recurring malcode. ACM, 2007.

    Google Scholar 

  9. He, Daojing, Sammy Chan, and Mohsen Guizani. “Mobile application security: malware threats and defenses.” IEEE Wireless Communications 22.1 (2015): 138–144.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kireet Muppavaram .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Muppavaram, K., Sreenivasa Rao, M., Rekanar, K., Sarath Babu, R. (2018). How Safe Is Your Mobile App? Mobile App Attacks and Defense. In: Bhateja, V., Tavares, J., Rani, B., Prasad, V., Raju, K. (eds) Proceedings of the Second International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-10-8228-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8228-3_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8227-6

  • Online ISBN: 978-981-10-8228-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics