Alwahedi, S., Al Ali, M., Ishowo-Oloko, F., Woon, W. L., & Aung, Z. (2016, October). Security in mobile computing: attack vectors, solutions, and challenges. In International Conference on Mobile Networks and Management (pp. 177-191). Springer, Cham.
Aron, L., & Hanacek, P. (2015, March). Overview of security on mobile devices. In 2015 2nd World Symposium on Web Applications and Networking (WSWAN) (pp. 1-11). IEEE.
Aonzo, S., Merlo, A., Tavella, G., & Fratantonio, Y. (2018, October). Phishing attacks on modern android. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1788-1801).
Android Architecture, Retrieved May 7, 2021, https://developer.android.com/guide/platform/index.html
Bernardeschi, C., Mercaldo, F., Nardone, V., & Santone, A. (2019). Exploiting Model Checking for Mobile Botnet Detection. Procedia Computer Science, 159, 963-972.
Chen, S., Xue, M., Fan, L., Hao, S., Xu, L., Zhu, H., & Li, B. (2018). Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. computers & security, 73, 326-344.
Cusack, B., Lutui, R., & Khaleghparast, R. (2016, December). Detecting slow ddos attacks on mobile devices. In The 27th Australasian Conference on Information Systems. Australasian Conference on Information Systems (ACIS).
Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C., Zhou, X., & Grace, M. (2017). Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness. arXiv preprint arXiv:1703.01537.
Divya, K., & Kumar, V. K. (2016). Comparative analysis of smart phone operating systems Android, Apple IOS and Windows. International Journal of Scientific Engineering and Applied Science (IJSEAS), 2(2), 432-439.
Kaspersky Lab Threat Review for 2016, Retrieved April 24, 2021, http://usa.kaspersky.com/about-us/press-center/press-releases/2016/Kaspersky_Lab_Threat_Review_for_2016_servers_for_sa le_global_botnets_and_a_strong_focus_on_mobile
Lee, Y., Heo, I., Hwang, D., Kim, K., & Paek, Y. (2015, June). Towards a practical solution to detect code reuse attacks on ARM mobile devices. In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy (pp. 1-8).
Li, H., Zhu, H., Du, S., Liang, X., & Shen, X. (2016). Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and Secure Computing, 15(4), 646-660.
Mavoungou, S., Kaddoum, G., Taha, M., & Matar, G. (2016). Survey on threats and attacks on mobile networks. IEEE Access, 4, 4543-4572.
Mirza Abdullah, S., Ahmed, B., & M Ameen, M. (2018). A new taxonomy of mobile banking threats, attacks and user vulnerabilities. Eurasian Journal of Science and Engineering, 3(3), 12-20.
Mohamed, I., & Patel, D. (2015, April). Android vs iOS security: A comparative study. In 2015 12th International Conference on Information Technology-New Generations (pp. 725-730). IEEE.
Melicher, W., Kurilova, D., Segreti, S. M., Kalvani, P., Shay, R., Ur, B., ... & Mazurek, M. L. (2016, May). Usability and security of text passwords on mobile devices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 527-539). Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J. P. (2015). Practical attacks against privacy and availability in 4G/LTE mobile communication systems. arXiv preprint arXiv:1510.07563.
Noureldien, N. A., Saeed, S. K., Salih, M. A., & Ahmed, A. M. (2015). Survey of mobile ad hoc networks attacks and a new classification scheme.
Rastogi, V., Shao, R., Chen, Y., Pan, X., Zou, S., & Riley, R. (2016, February). Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. In NDSS.
Shahriar, H., Klintic, T., & Clincy, V. (2015). Mobile phishing attacks and mitigation techniques. Journal of Information Security, 6(03), 206.
Sivaraman, V., Chan, D., Earl, D., & Boreli, R. (2016, July). Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (pp. 195-200).
Squires, W., & Centonze, P. (2016, May). Cross-platform access-rights analysis of mobile applications. In Proceedings of the International Conference on Mobile Software Engineering and Systems (pp. 295-296).
Securelist by Kaspersky on December 2019, Annual Threats Statistics, Retrieved April 23, 2021, Available: https://www.kaspersky.com/about/press-releases/2019_malware-variety-grows-by-137-in-2019-due-to-web-skimmers
Securelist by Kaspersky on February 2021, Spam and Phishing in 2020, Retrieved April 24, 2021, Available: https://securelist.com/spam-and-phishing-in-2020/100512/
Windows 10 Mobile security guide, Retrieved May 8, 2021, https://docs.microsoft.com/en-us/windows/device-security/windows-10-mobile-security-guide
Yesilyurt, M., & Yalman, Y. (2016). Security threats on mobile devices and their effects: estimations for the future. International Journal of Security and Its Applications, 10(2), 13-26.
Yewale, A., & Singh, M. (2016, May). Malware detection based on opcode frequency. In 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT) (pp. 646-649). IEEE.
Zaidi, S. F. A., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A survey on security for smartphone device. International journal of advanced computer science and applications, 7(4), 206-219.
- Abstract viewed - 218 times
- Pdf downloaded - 129 times
Siti Nuraisyah Zakaria
School of Computing, Universiti Utara Malaysia (UUM), Malaysia
Mohamad Fadli Zolkipli
School of Computing, Universiti Utara Malaysia (UUM), Malaysia
How to Cite
Review on Mobile Attacks: Operating System, Threats and Solution
Vol 4 No 2 (2021): June
Submitted: May 10, 2021
Published: Jun 15, 2021
Obviously, smartphones and other mobile devices have replaced personal computers (PCs). They have become part of users' personal and business lives. Therefore, they involve with security issues as well as mobile attacks issues have arisen nowadays. Not only to individuals but government agencies and many companies become the victim of these malicious attacks. As these devices are widely used to access and stored sensitive personal information, this would be a big concern. Other that that, during this pandemic user always use smartphone for important transaction such as online banking and online purchases. The vulnerability of the attacks is high, especially when unsuspecting users being the targets. Companies could lead to huge loss, when it is due to data leakage or losing data resources that use to protect the organization. In fact, malicious attacks on mobile devices are considered high rather than PCs. However, these attacks have been severed due to the ignorance of users who fail to enable the security setting in their phone. This paper discusses mobile security on operating system followed by some discussion on various attack on mobile devices. The discussion intended to give solutions by reduce the mobile attacks.