Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention

@article{Srivastava2019SmartphoneTS,
  title={Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention},
  author={Saurabh Ranjan Srivastava and Sachin Dube and Gulshan Shrivastaya and Kavita Sharma},
  journal={Cyber Security in Parallel and Distributed Computing},
  year={2019}
}
A QOS ESTIMATION ALGORITHM FROM CALLER RINGTONE ANALYSIS IN GSM NETWORK
TLDR
The proposed algorithm was able to compute the QoS using Caller Ringtone only, thus independent of MNP, and an error margin of less than 5 % was observed when the developed technique was compared to the ground truth.
Android application behavioural analysis for data leakage
TLDR
A novel algorithm is proposed to identify the malware‐based applications by probing the permission patterns by using the k‐means algorithm to quarantine the malware application by obtaining permission clusters and substantiates the use of application permissions for potential applications in android malware detection.
APPLICATIONS WITH BLOCKCHAIN TECHNIQUE
BLOCKCHAIN IN SOCIAL NETWORKING
D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices
TLDR
An overview of MCC authentication protocols is presented and a Dual-Factor Authentication Protocol for MCC devices (D-FAP) is proposed, which aims at increasing authentication security by using multi-factors while offloading computation to the cloud to reduce battery consumption.
Enhanced Approach for Android Malware Detection
TLDR
An enhanced model is also proposed to identify malware applications, inspired by the web crawler technique, to secure the ignorable overhead on the device and provide highly accurate repackaged version detection of a known app.
...
1
2
...

References

SHOWING 1-10 OF 22 REFERENCES
Click Fraud Detection In Mobile Ads Served In Programmatic Exchanges
TLDR
Programmatic inventory auction or Real Time Bidding is the latest buzz in the mobile advertisement industry and detecting advertisements that auto click becomes very important for a programmatic exchange that conducts these auctions.
Mobile Phishing Attacks and Mitigation Techniques
TLDR
This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures to bring more awareness to emerging mobile device-based phishingattacks.
Determinants of Mobile Apps' Success: Evidence from the App Store Market
TLDR
It is found that broadening app offerings across multiple categories is a key determinant that contributes to a higher probability of survival in the top charts, and sellers must utilize the natural segmentation in consumer tastes offered by the different categories to improve sales performance.
A Survey on Security for Mobile Devices
TLDR
This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications, based upon the detection principles, architectures, collected data and operating systems.
Investigating app store ranking algorithms using a simulation of mobile app ecosystems
TLDR
Results show that the effectiveness of the shop front is highly dependent on the speed at which content is updated, and the effects of different app ranking algorithms for the Top Apps Chart and the frequency of updates of the New Apps Chart on the download-to-browse ratio.
Mobile Security: A Look Ahead
TLDR
An overview of the current threats based on data collected from observing the interaction of 75 million users with the Internet is provided, giving an insight into what threats wait on the horizon.
Phishing detection taxonomy for mobile device
TLDR
This paper addresses the current trend phishing detection for mobile device and identifies significant criterion to improve phishing Detection techniques on mobile device.
Addressing Security and Privacy Risks in Mobile Applications
TLDR
Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation, causing serious information security and data privacy issues and can have severe repercussions on users and organizations alike.
BYOD: Security and Privacy Considerations
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies
...
1
2
3
...