An investigation study for risk calculation of security vulnerabilities on android applications
Applications within mobile devices, although useful and entertaining, come with security risks to private information stored within the device such as name, address, and date of birth. Standards, frameworks, models, and metrics have been proposed and implemented to combat these security vulnerabilit...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2022-03-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02642 am a22003373u 4500 | ||
---|---|---|---|
001 | ijeecs27080_16140 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Abdullah, Radhwan M. |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Abualkishik, Abedallah Zaid |e author |
700 | 1 | 0 | |a Isaacc, Najla Matti |e author |
700 | 1 | 0 | |a Alwan, Ali A. |e author |
700 | 1 | 0 | |a Gulzar, Yonis |e author |
245 | 0 | 0 | |a An investigation study for risk calculation of security vulnerabilities on android applications |
260 | |b Institute of Advanced Engineering and Science, |c 2022-03-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/27080 | ||
520 | |a Applications within mobile devices, although useful and entertaining, come with security risks to private information stored within the device such as name, address, and date of birth. Standards, frameworks, models, and metrics have been proposed and implemented to combat these security vulnerabilities, but they remain to persist today. In this review, we discuss the risk calculation of android applications which is used to determine the overall security of an application. Besides, we also present and discuss the permission-based access control models that can be used to evaluate application access to user data. The study also focuses on examining the predictive analysis of security risks using machine learning. We conduct a comprehensive review of the leading studies accomplished on investigating the vulnerabilities of the applications for the Android mobile platform. The review examines various well-known vulnerabilities prediction models and highlights the sources of the vulnerabilities, prediction technique, applications and the performance of these models. Some models and frameworks prove to be promising but there is still much more research needed to be done regarding security for Android applications. | ||
540 | |a Copyright (c) 2021 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |||
690 | |a Access control; Android; Predictive analysis; Risk assessment; Security metrics | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 25, No 3: March 2022; 1736-1748 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v25.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/27080/16140 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/27080/16140 |z Get fulltext |