Android architecture: attacking the weak points

@article{MansfieldDevine2012AndroidAA,
  title={Android architecture: attacking the weak points},
  author={Steve Mansfield-Devine},
  journal={Network Security},
  year={2012},
  volume={2012},
  pages={5-12}
}
Much of this stems from Google’s desire to create a platform that is relatively open – relative, that is, to Apple’s ‘walled garden’ for iOS. By eschewing rigid control, Google has created an environment that is highly attractive to many developers, app vendors and users (especially those of the geek persuasion). But the openness and flexibility have also introduced weak points that are being mercilessly exploited. In this second article in our series of three on Android security, we’ll look… CONTINUE READING
BETA

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 11 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-7 OF 7 REFERENCES

Android ads could attacks, study warns

  • Talbot, David
  • Technology Review,
  • 2012

Apple: Five million iPhone 5 sales, 100 million iOS 6

  • Friedman, Lex
  • Macworld,
  • 2012

Early results from X-Ray: over 50% of Android devices are vulnerable

  • Oberheide, Jon
  • The Duo Bulletin,
  • 2012

iOS Version Stats

  • Smith, David
  • Accessed 2 Oct
  • 2012

Inside the Android security patch lifecycle

  • Wyatt, Tim
  • Lookout blog,
  • 2011

Mercury . MWR Labs

  • David Talbot
  • InfoSecurity

‘ Platform versions ’

  • Jon Oberheide

Similar Papers

Loading similar papers…