Abstract
Usage of mobile phones has increased over the years, all over the world. With the extensive usage of smartphones, it has been confirmed by that most of the smartphone users work in an Android platform as it is an open platform which can be used by anyone to develop applications or introduce malicious activities; Reports suggest that up to 85% of the mobile phones used are in Android platform (Portal, Statistics. Number of monthly active Facebook users worldwide as of 1st quarter 2015 (in millions), 2015) [1]. At the least, a smartphone user uses a minimum of 12 applications, which arises the question, “how safe is your mobile?”. This paper focuses on the said problem and provides an insight about some common types of attacks that use the vulnerability in applications and some defense methods and techniques that could be followed to prevent them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Portal, Statistics. “Number of monthly active Facebook users worldwide as of 1st quarter 2015 (in millions).” Luettavissa: http://www.statista.com/statistics/264810/number-ofmonthly-active-facebook-users-worldwide/. Luettu 26 (2015).
Ballagas, Rafael, et al. “Byod: Bring your own device.” Proceedings of the Workshop on Ubiquitous Display Environments,” Ubicomp. Vol. 2004. 2004.
Kang, Joon-Myung, Sinseok Seo, and James Won-Ki Hong. “Usage pattern analysis of smartphones.” Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific. IEEE, 2011.
Kulkarni, Shakuntala P., and Sachin Bojewar. “Vulnerabilities of Smart Phones.” (2015).
Rekanar, Kaavya. “Text Classification of Legitimate and Rogue online Privacy Policies: Manual Analysis and a Machine Learning Experimental Approach.” (2016).
D. Guo, A. Sui, and T. Guo, “A Behavior Analysis Based Mobile Malware Defense System,” Proc. ICSPCS, pp. 16, 2012.
M. Kireet, Dr. Meda Sreenivasa Rao. “Investigation of Collusion Attack Detection in Android Smartphones.” International Journal of Computer Science and Information Security, (IJCSIS) Vol. 14, No. 6, June 2016.
Garera, Sujata, et al. “A framework for detection and measurement of phishing attacks.” Proceedings of the 2007 ACM workshop on Recurring malcode. ACM, 2007.
He, Daojing, Sammy Chan, and Mohsen Guizani. “Mobile application security: malware threats and defenses.” IEEE Wireless Communications 22.1 (2015): 138–144.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Muppavaram, K., Sreenivasa Rao, M., Rekanar, K., Sarath Babu, R. (2018). How Safe Is Your Mobile App? Mobile App Attacks and Defense. In: Bhateja, V., Tavares, J., Rani, B., Prasad, V., Raju, K. (eds) Proceedings of the Second International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-10-8228-3_19
Download citation
DOI: https://doi.org/10.1007/978-981-10-8228-3_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8227-6
Online ISBN: 978-981-10-8228-3
eBook Packages: EngineeringEngineering (R0)