A Review on Android Authentication System Vulnerabilities
نویسنده
چکیده
Mobile security has become a crucial aspect of mobile computing. People are maintaining their confidential and valuable information on smart phones. Most of the users and businesses use smart phones as message tools, and means of scheduling and establishing their work and private life. Smart phones contain increasing amount of exposed information to which access must be prohibited. But security is not easy, and security with mobile devices, smart phones is no exemption. Android is an operating system based on the Linux kernel, developed by Android Inc. which Google acquired in 2005. Initially, Android was launched to support touch screen devices like smart phones. These devices support different types of screen locks, like swipe lock, PIN lock, pattern lock, gesture lock, facial lock, etc. These passwords are susceptible to many attacks such as bruteforce, dictionary attacks. But we need to follow preventing strategiesto meaningfully improve our mobile security. This paper presents a study on various attacks on mobile passwords and educates the user about mobile forensics. Keywords—security,bruteforce,dictionaryattacks, Android, mobile forensics.
منابع مشابه
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android
Next generation IP telephony such as the IP Multimedia Subsystem (IMS) framework has been used to create Internet calling services which let cellular users make and receive calls even when without cellular reception. In this paper, we look at the security aspects of Internet calling services and other systems that use the 3GPP Authentication and Key Agreement (AKA) protocol for authentication, ...
متن کاملA study on usability and security features of the Android pattern lock screen
Panagiotis Andriotis is a PhD student in Computer Science in Bristol, U.K.. He holds an MSc with Distinction in Computer Science from the University of Bristol, U.K. and a BSc in Mathematics from the University of Athens, Greece. His main research area is Digital Forensics with a focus on smartphones and other mobile devices running the Android Operating System. He is also interested in Human A...
متن کاملHigh Assurance Models for Secure Systems
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and mobile devices that suffer from vulnerabilities, whi...
متن کاملA Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)
The Android platform is an open source operating system, which is widely used on Smartphones. Android operating system usage and adaptation is rapidly increasing with a variety of applications. It also, allows developers to freely access and modifies source code. The open nature of the Android platform attracts attackers to do different types of criminal activities. The android users likely to ...
متن کاملA Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)
The Android platform is an open source operating system, which is widely used on Smartphones. Android operating system usage and adaptation is rapidly increasing with a variety of applications. It also, allows developers to freely access and modifies source code. The open nature of the Android platform attracts attackers to do different types of criminal activities. The android users likely to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016