Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2017). A Survey on Smartphones Security: Software Vulnerabilities, Malware, Attacks. (IJACSA) International Journal Advanced Computer Science Applications.
Bicakci, K., Unal, Ascioglu & Adalier. (2014). Mobile Authentication Secure Against Man-In-The-Middle Attack. 11th International Conference Mobile Systems Pervasive Computing.Orlando.
Chatterjee, S., Paul, K., Roy, R., & AsokeNath. (2016). A Comprehensive Study on Security issues in Android Mobile Phone - Scope and Challenges. International Journal of Innovative Research in Advanced Engineering (IJIRAE).
Chaudhry, J. A., Chaudhry, S. A., & Rittenhouse, R. G. (2016). Phishing Attacks and Defenses. International Journal of Security and its Applications .
Dua, L. & Bansal, D. (2014). Taxonomy : Mobile Malware Threats and Detection Techniques. Computer Science & Information Technology (CS & IT).
Gyamfi, N., & Owusu, E. (2018). Survey of Mobile Malware Analysis, Detection Techniques and Tool. IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). British Columbia: IEMCON.
Humayun, M., Jhanji, N. Z., Alsayat, A., & Ponnusamy, V. (2020). Internet of things and ransomware: Evolution, mitigation and prevention. Egyptian Informatics Journal.
Khan, M. A. R., Tripathi, R. C., & Kumar, A. (2019). A Malicious Attacks and Defense Techniques
Android-Based Smartphone. Journal Innovative Technology Exploring and Engineering.
Marforio, C., Masti, R. J., Soriente, C., Kostiainen, K., & Capkun, S. (October, 2016). Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking. Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices. New York: SIGSAC.
McAfee. (2018). McAfee Mobile Threat Report Q1 2018. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2018.pdf
Mishra, S., & Thakur, A. (2019). A Survey on Mobile Security Issues. Proceedings of Recent Advances in Interdisciplinary Trends in Engineering & Applications (RAITEA) . India.
Mohamed, I. (2015). Android vs. iOS Security: A Comparative Study. 12th International Conference on Information Technology - New Generations (ITNG). Nevada: ITNG 2015.
Muslim, A. K., Dzulkifli, D. Z., Nadhim, M. H., & Abdellah, R. H. (2019). A Study of Ransomware Attacks: Evolution & Prevention. Journal of Social Transformation Regional Development.
Nagarjun, P. M. D., & Ahamad, S. S. (2018). Review of Mobile Security Problems and Defensive Methods. International Journal of Applied Engineering Research.
Polla, M. L., Martinelli, F., & Sgandurra, D. (2013). A Survey on Security for Mobile Devices. IEEE Communications Surveys & Tutorials.
Priyanka, V. K., & Payal, N. I. (2013). Internal structure of iOS and Building tools for iOS apps. International Journal Of Computer Science And Applications .
Securelist. (2020). Mobile Malware Evolution 2020. https://securelist.com/mobile-malware-evolution-2020/101029/
Thiruvaazhi, U., & Arthi, R. (2018). Threats to Mobile Security and Privacy. International Journal of Recent Technology and Engineering (IJRTE).
Wright, J., Dawson, M. E., & Omar, M. (2012). Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smartphones. Journa Information System Technology & Planning.
Yadav, A. M., & Reddy, B. I. (2019). Android Device Attacks and Threats. International Research Journal of Engineering and Technology (IRJET).
Yesilyurt, M., & Yalman, Y. (2016). Security Threats on Mobile Devices and their Effects : Estimations for the Future. International Journal of Security and Its Applications.
Zhang, D., Guo, Y., Guo, D., & Yu, G. (2017). Privacy Leaks through Data Hijacking Attack on Mobile Systems. ITM Web of Conferences.
- Abstract viewed - 90 times
- Pdf downloaded - 37 times
Ahmad Mustaqim Baharin
Universiti Utara Malaysia
Mohamad Fadli Zolkipli
Universiti Utara Malaysia
How to Cite
Review on Current Target of Mobile Attacks
Vol 4 No 2 (2021): June
Submitted: Jun 1, 2021
Published: Jun 15, 2021
Nowadays, the world is in the digital era. The use of the internet, computers, smartphones and other electronic gadgets is increasingly becoming a necessity for all human beings. Various advantages can be used with electronic devices. Smartphones have also established themselves as a common substitute for computers due to their portability, small screen size, and low manufacturing costs. The use of smartphones is greatly increasing among the people day by day. It doesn't matter age or gender. As a result, smartphones have become a target by hackers who want to attack smartphones. In the smartphone market, the most famous operating system for smartphone is Android. This popularity makes it primary target for hackers and hackers. In this review paper, we have studied the current trend of mobile attacks. We also investigated about malicious and types of malwares for mobile attacks and also malware detection techniques of mobile attacks. We also organized a proper table which help to visualized and easy comparison information.