Academic literature on the topic 'Android system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Android system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Android system security"
Jadhav, Atul Chandrakant, and Sunil P. Khachane. "AntiRIG Security System in Android." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 6 (June 30, 2017): 346–49. http://dx.doi.org/10.23956/ijarcsse/v7i6/0261.
Full textHan, So-Ra, and Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textMarpaung, Ruth Shyintia Rouli. "Android Based Door Security Design." Brilliance: Research of Artificial Intelligence 2, no. 1 (June 1, 2022): 26–30. http://dx.doi.org/10.47709/brilliance.v2i1.1535.
Full textPark, Jae-Kyung, and Sang-Yong Choi. "Studying Security Weaknesses of Android System." International Journal of Security and Its Applications 9, no. 3 (March 31, 2015): 7–12. http://dx.doi.org/10.14257/ijsia.2015.9.3.02.
Full textHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Full textFadjar Bastari, Winarno, and Muhammad Andri Eko Prasetyo. "Locker Security System Design Based On Internet of Things (IoT) Android Interface." BEST : Journal of Applied Electrical, Science, & Technology 3, no. 2 (September 15, 2021): 30–35. http://dx.doi.org/10.36456/best.vol3.no2.4323.
Full textZulfian Wathoni, Khairunazri, and Muh. Fahrurrozi. "Motorcycle Safety System With Android Based Arduino." TEKNIMEDIA: Teknologi Informasi dan Multimedia 1, no. 2 (January 5, 2021): 57–63. http://dx.doi.org/10.46764/teknimedia.v1i2.26.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "A Web-Based Android Supervisory Control System." Applied Mechanics and Materials 284-287 (January 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.
Full textDissertations / Theses on the topic "Android system security"
Cheng, Zhiyong. "A multi-agent security system for Android platform." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43775.
Full textXu, Mingzhe. "Security Enhancement of Secure USB Debugging in Android System." University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1417536423.
Full textBurguera, Hidalgo Iker. "Behavior-based malware detection system for the Android platform." Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73647.
Full textVančo, Matúš. "Dynamická úprava bezpečnostní politiky na platformě Android." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255426.
Full textPossemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem." Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Full textWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Borek, Martin. "Intrusion Detection System for Android : Linux Kernel System Salls Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222382.
Full textSmartphones ger tillgång till en uppsjö av privat information som potentiellt kan leda till finansiella och personliga svårigheter. Därför måste de vara väl skyddade. En dynamisk lösning behövs som skyddar Android-telefoner i realtid. Systemanrop har tidigare undersökts som en effektiv metod för dynamisk analys av Android. Emellertid fokuserade dessa tidigare studier på systemanrop i en emulerad sandbox miljö, vilket inte visar lämpligheten av detta tillvägagångssätt för realtidsanalys av själva enheten. Detta arbete fokuserar på analys av Linux kärnan systemanrop på ARMv8 arkitekturen. Givet begränsningarna som existerar i Android-telefoner är det väsentligt att minimera resurserna som krävs för analyserna. Därför fokuserade vi på sekvenseringen av systemanropen. Med detta tillvägagångssätt sökte vi en metod som skulle kunna användas för realtidsdetektering av skadliga program direkt på Android-telefoner. Vi experimenterade dessutom med olika funktionsvektorer för att representera data; histogram, n-gram och co-occurrence matriser. All data hämtades från en riktig Android enhet då de existerande Android emulatorerna visade sig vara olämpliga för att emulera ett system med ARMv8 arkitekturen. Resultaten visar att Linus kärnans sekvensering har tillräckligt med information för att upptäcka skadligt beteende av skadliga applikationer på ARMv8 arkitekturen. Alla funktionsvektorer presterade bra. N-gram och cooccurrence matriserna uppnådde till och med lysande resultat. För att reducera beräkningskomplexiteten av analysen, experimenterade vi med att enbart använda de vanligaste systemanropen. Fast noggrannheten minskade lite, var det värt uppoffringen eftersom beräkningskomplexiteten reducerades märkbart.
Trabalza, Daniele. "Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119825.
Full textPalm, Alexander, and Benjamin Gafvelin. "Ethical Hacking of Android Auto in the Context of Road Safety." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299647.
Full textI takt med en evigt ökande efterfrågan på att sammankoppla smarttelefoner med infotainmentsystem, har allt fler börjat använda Android Auto i sina fordon världen över. En bieffekt av att allt fler sammankopplar sina mobiler till infotainmentsystem, är att det leder till fler möjligheter för illvilliga parter att stjäla privat data och sätta Android Autoanvändares liv i fara. Målet med denna avhandling är att fastställa hur säkert Android Auto är i avseende till vägsäkerhet. Den huvudsakliga forskningsfrågan är att lista ut om Android Auto kan attackeras av attacker som utnyttjar sårbarheter i Android operativsystemet. Forskningsfrågan besvarades genom att skapa flertal konceptattacker mot Android Auto användandes av ett emulerat infotainmentsystem och mobiltelefoner. En utredning utfördes även gällande applikationens kommunikationskanal mellan telefonen och infotainmentskärmen. Resultatet från denna avhandling demonstrerade att många attacker är tillräckligt allvarliga för att äventyra trafikanternas säkerhet. Det finns en avsevärd risk för framgångsrika attacker när Android Auto körs lokalt på telefonen utan en USB koppling till infotainmentsystemet, och en liten risk när telefonen är kopplad till infotainmentsystemet. Avlyssning och uppfångning av kommunikationen i USB kanalen visade att en krypteringsalgoritm vars version har existerande sårbarheter kan avkrypteras och utnyttjas för att potentiellt attackera Android Auto.
Krishnan, Neelima. "Android Hypovisors: Securing Mobile Devices through High-Performance, Light-Weight, Subsystem Isolation with Integrity Checking and Auditing Capabilities." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/51129.
Full textMaster of Science
Bjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Full textBooks on the topic "Android system security"
service), ScienceDirect (Online, ed. Android forensics: Investigation, analysis, and mobile security for Google Android. Waltham, MA: Syngress, 2011.
Find full textAndroid security: Attacks and defenses. Boca Raton: Taylor & Francis, 2013.
Find full textJiang, Xuxian. Android Malware. New York, NY: Springer New York, 2013.
Find full textShane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textHoog, Andrew. Android Forensics: Investigation, Analysis and Mobile Security for Google Android. Elsevier Science & Technology Books, 2011.
Find full textTomal, Sazzad Mahmud. Hacking : Art of Breaking System: Hacking Website, Android and Security Systems. Independently Published, 2019.
Find full textAndroid Security Internals: An In-Depth Guide to Android's Security Architecture. No Starch Press, 2014.
Find full textMisra, Anmol, and Abhishek Dubey. Android Security. Taylor & Francis Group, 2019.
Find full textAndroid Apps Security. Apress, 2012.
Find full textMisra, Anmol, and Abhishek Dubey. Android Security: Attacks and Defenses. Taylor & Francis Group, 2013.
Find full textBook chapters on the topic "Android system security"
Zhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie, and Gaofei Wu. "An Android Vulnerability Detection System." In Network and System Security, 169–83. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.
Full textZhauniarovich, Yury. "Security of the Android Operating System." In Lecture Notes in Computer Science, 272–74. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17127-2_22.
Full textZhang, Tong, Tao Li, Hao Wang, and Zhijie Xiao. "AndroidProtect: Android Apps Security Analysis System." In Collaborate Computing: Networking, Applications and Worksharing, 583–94. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59288-6_58.
Full textAbdul Kadir, Andi Fitriah, Natalia Stakhanova, and Ali Akbar Ghorbani. "Android Botnets: What URLs are Telling Us." In Network and System Security, 78–91. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_6.
Full textJin, Junjie, and Wei Zhang. "System Log-Based Android Root State Detection." In Cloud Computing and Security, 793–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_69.
Full textSanz, Borja, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, and Pablo G. Bringas. "MADS: Malicious Android Applications Detection through String Analysis." In Network and System Security, 178–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38631-2_14.
Full textAndriatsimandefitra, Radoniaina, and Valérie Viet Triem Tong. "Capturing Android Malware Behaviour Using System Flow Graph." In Network and System Security, 534–41. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11698-3_43.
Full textLu, Yemian, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, and Wei Guo. "A Comprehensive Study of Permission Usage on Android." In Network and System Security, 64–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_5.
Full textGupta, Ravika, Gulshan Shrivastava, Rohit Anand, and Tina Tomažič. "IoT-Based Privacy Control System through Android." In Handbook of e-Business Security, 341–63. Boca Raton, FL : CRC Press, 2018.: Auerbach Publications, 2018. http://dx.doi.org/10.1201/9780429468254-14.
Full textFioravanti, Mark E., Ayush Shah, and Shengzhi Zhang. "A Study of Network Domains Used in Android Applications." In Network and System Security, 467–74. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_35.
Full textConference papers on the topic "Android system security"
Khokhlov, Igor, and Leon Reznik. "Android system security evaluation." In 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2018. http://dx.doi.org/10.1109/ccnc.2018.8319325.
Full textShukla, Ankur, Divya Vikash, Bharavi Mishra, and Poonam Gera. "Permission recommender system for Android." In SIN '17: Security of Information and Networks. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3136825.3136860.
Full textCajic, Miroslav, Bogdan Brkic, and Mladen Veinovic. "System of assessment security for Android operating system." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419491.
Full textAbhadiomhen, S. E., R. Nzeh, N. J. Ezeora, I. Uzo, B. C. Uzo, N. E. Ogbene, and G. E. Anichebe. "Design Of An Automated Home Security System With Remote Monitoring Capability. Proceedings of the 28th iSTEAMS Intertertiary Multidisciplinary Conference." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p4.
Full textGuo, Tao, Puhan Zhang, Hongliang Liang, and Shuai Shao. "Enforcing Multiple Security Policies for Android System." In 2nd International Symposium on Computer, Communication, Control and Automation. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/3ca-13.2013.42.
Full textChen, Yuanchun, Ning Liu, Guangtao Zhai, Zhongpai Gao, and Ke Gu. "Information security display system on android device." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848294.
Full textRoy, Sulochana. "IOT Enabled Security System for Android users." In 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE). IEEE, 2018. http://dx.doi.org/10.1109/icrieece44171.2018.9008874.
Full textSharma, Rupam Kumar, Ayub Mohammad, Himanka Kalita, and Dhiraj Kalita. "Android interface based GSM home security system." In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2014. http://dx.doi.org/10.1109/icicict.2014.6781278.
Full textSun, Lin, ShuTao Huang, YunWu Wang, and MeiMei Huo. "Application Policy Security Mechanisms of Android System." In 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS). IEEE, 2012. http://dx.doi.org/10.1109/hpcc.2012.258.
Full textLi, Yingbo, Xiao Lu, and Jing Fang. "Android system security vulnerability and response measures." In The 2nd Information Technology and Mechatronics Engineering Conference (ITOEC 2016). Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/itoec-16.2016.27.
Full text