Total views : 453
A Systematic Analysis on Mobile Application Software Vulnerabilities: Issues and Challenges
Objectives: Mobile network, ad-hoc network or Wireless ad-hoc network is the latest networking trend today. In the past fifteen years the no. of Mobile phone users has grown exponentially. The perks offered by this wireless mode of networking are open to all: anywhere, anytime, un tethered access to a huge no. of global users. Statistical Analysis: This paper consists of systematic review and analysis of various existing techniques which helps us to cope against such disasters with an actual and sorted representation. In the end, we wind up our results with the merits and demerits of existing methods along with the liabilities of future scope in this area. Findings: The review studies have shown various mobile software vulnerabilities with their advantages, disadvantages along with their future scopes. Application: The application of mobile software networks is innumerable, from mobile browsers to e-commerce to mobile money, there uses are extensive and important.
Ad-hoc Network, Authentication, Malware, Mobile Network, Reliability, Vulnerabilities.
- Hamieh A, Jalel BO. Detection of Jamming attacks in wireless ad hoc networks using error distribution. Proceedings of International Conference on Communications (ICC); 2009. p. 1–6.
- Papadimitratos P, Aleksander J. GNNS based positioning: Attacks and countermeasures. Proceedings of Military Communications Conference- MILCOM; 2008. p. 1–7.
- Sadeghzadeh SH, Seyed JMS, Mohammad M. A new secure scheme purposed for recognition and authentication protocol in bluetooth environment. Proceedings of 12th International Conference on Advanced Communication Technology (ICACT). 2010; 2:1326–31.
- Prieto MD, Joan AM, Jordi HJ. JXTA security in mobile contrained devices. Proceedings of International 24th Conference on Advanced Networking and Application Workshops (ICCSNT); 2013. p. 1247–50.
- Mi Z, James YY. Obstacle-avoidance connectivity restoration for mobile sensor systems with local information. Proceedings of International Conference on Communications (ICC); 2015. p. 6395–9.
- Wang Z, Dijiang H, Huijun W, Bing L, Yuli D. Towards distributed privacy- preserving mobile access control. Proceedings of Global Communications Conference (GLOBECOM); 2014. p. 582–7.
- Aoki S, Kaoru S. Privacy-preserving community sensing for medical research with duplicated perturbation. Proceedings of International Conference on Communications (ICC); 2014. p. 4252–7.
- Song R, Peter CM. ROLSR: A Robust Optimising Link State Routing Protocol for military ad-hoc networks. Proceedings of International Millitary Communications Conference (MILCOM); 2010. p. 1002–10.
- Huang X, Pritam GS, Dharmendra S. Fast scalar multiplication for elliptic curve cryptography in sensor networks with hidden generator points. Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 2010. p. 243–49.
- Wu L, Xiaogianj D, Jie W. Effective defence schemes for phishing attacks on mobile computing platforms. Proceedings of Transactions on Vehicular Technology; 2015. p. 1–13.
- Anne VPK, Venkata R, Rajashekhara RK. Enforcing the security within mobile using cloud and its infrastucture. Proceedings of CSI 6th International Conference on Software Engineering (CONSEG); 2012. p. 1–4.
- Barra S, Maria DM, Chiara G, Daniel R, Harry W. FAME: Face Authentication for Mobile Encounter. Proceedings of Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS); 2013. p. 1–7.
- Ashraf K, Rachid A, Behzad B. File management in a mobile DTH-based P2P environment. Proceedings of 26th International Conference on Advanced Information Networking and Applications; 2012. p. 415–22.
- Katsaros I, Martin I, Honary B. Threats to next generation mobile application software. Proceedings of The 2nd IEEE Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN, IET, 2004. p. 10/1–10/3.
- Chen CM, Ya HO. Secure mechanism for mobile web browsing. Proceedings of 17th International Conference on Parallel and Distributed Systems (ICPADS); 2011. p. 924–8.
- Stirparo P, Igor NF, Marco T, Ioannis K. In-memory credentials robbery on android phones. Proceedings of Conference on World Congress on Internet Security (WorldCIS); 2013. p. 88–93.
- Dehghantanha A, Nur IU, Ramlan M. Towards data centric mobile security. Proceedings of 7th IEEE Conference on Information Assurance and Security (IAS); 2011. p. 62–7.
- Dhaya R, Poongodi M. Detecting software vulnerabilities in android using static analysis. Proceedings of International Conference on Advanced Communication Control Computing Technologies (ICACCCT); 2014. p. 915–18.
- Choyi VK, Michel B. Low-latency secure mobile communications. Proceedings of International Conference on Wireless and Mobile Computing, Networking and Communication (WiMob’2005). 2005; 2:38–43.
- Sathyan J, Manesh S. Multi-layered collaborative approach to address enterprise mobile security challenges. Proceedings of 2nd Workshop on Collaborative Security Technologies (CoSec); 2010. p. 1–6.
- Anane R, Steven M, Behzad B. Trusted P2P group interaction. Proceedings of the 2nd International Conference on Computer Science and its Applications (CSA 2009), Korea; 2009 Dec. p. 1–8.
- Ali A, Pavol Z, Dale L, Ron R. A new CVSS-based tool to mitigate the effects of software vulnerabilities. International Journal for Information Security Research. 2011; 1(4):178– 82.
- Singh PK, Sangwan OP, Arun S. A systematic review on fault based mutation testing techniques and tools for Aspect- J Program. Proceedings of 3rd IEEE International Conference on Advance Computing Conference (IACC), India; 2013. p. 1455–61.
- Singh PK, Rajan P, Sangwan OP. A critical analysis on software fault prediction techniques. World applied Science Journal. 2015; 33(3):371–9.
- Singh PK, Dishti A, Aakriti G. A systematic review on software defect prediction. Proceedings of INDIACom-2015: 2nd International Conference on Computing for Sustainable Global Development, India; 2015. p. 1793–7.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.