The Demonstration of Android Vulnerabilities

Mallela David Vinay, Mandavyapuram Hemanth Kumar, Banoth Hemanth,Deepak Singh Tomar

2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)(2024)

引用 0|浏览1
暂无评分
摘要
The development of mobile applications is increasing rapidly. Client-server architectures are common in many of these systems. IOS and Android are the most commonly used operating systems for the client. Smartphones can keep any type of valuable files, including contacts, call logs, emails, location history, photographs, vedios and messages. Users’ private information kept on the device can be accessed by malicious programs. Android application vulnerabilities like SQL injection, XSS etc. analyze source code of security patches of widely used applications written in weak and strong types of languages. In accordance with OWASP mobile vulnerabilities, this system demonstrates the most common vulnerabilities and attacks, namely session management, broken authentication, SQL injection and insecure data storage. Android security has a lot of flaws that may be exploited, and these vulnerabilities or attacks are quite efficient and vital for any application. A detailed explanation of low security and high security is given when an attack is performed in the application system. The research results demonstrate that security is only associated with just a few of software failure kinds that impact a select number of cases. By conducting a detailed analysis, the system will be able to identify existing holes in the Android operating system and make the most informed decisions to make it more secure.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要