Mobile Security: Attacks and Prevention - Security in Mobile Communication

Mobile Security: Attacks and Prevention - Security in Mobile Communication

Meenakshi Tripathi, Jyoti Gajrani, Vinesh Kumar Jain
ISBN13: 9781522523420|ISBN10: 1522523421|EISBN13: 9781522523437
DOI: 10.4018/978-1-5225-2342-0.ch003
Cite Chapter Cite Chapter

MLA

Tripathi, Meenakshi, et al. "Mobile Security: Attacks and Prevention - Security in Mobile Communication." Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security, edited by Dharm Singh, IGI Global, 2017, pp. 43-59. https://doi.org/10.4018/978-1-5225-2342-0.ch003

APA

Tripathi, M., Gajrani, J., & Jain, V. K. (2017). Mobile Security: Attacks and Prevention - Security in Mobile Communication. In D. Singh (Ed.), Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security (pp. 43-59). IGI Global. https://doi.org/10.4018/978-1-5225-2342-0.ch003

Chicago

Tripathi, Meenakshi, Jyoti Gajrani, and Vinesh Kumar Jain. "Mobile Security: Attacks and Prevention - Security in Mobile Communication." In Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security, edited by Dharm Singh, 43-59. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2342-0.ch003

Export Reference

Mendeley
Favorite

Abstract

Mobile communication has various important issues such as congestion control, scarcity of radio spectrum, bandwidth utilization, and security. With increased number of threats in mobile devices, security has become the most important issue now-a-days. Security can be considered primarily at two levels; wireless transmission medium and mobile data level, where malicious applications execute their behavior by exploiting vulnerabilities present in mobile OS. The chapter also focuses on the latter one as these attacks can be easily performed by targeting vulnerabilities present in OS. The content is specifically on Android Operating System security as Android has become the largest installed base of mobile platform. This chapter specifies these vulnerabilities and focuses on malicious intentions of latest and sophisticated malware in detail. The chapter covers static and dynamic analysis tools as well as focuses on limitations of these methods for analyses. The results for malware samples with emulator detection capabilities show that these malware behaves more as benign samples.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.