Akter et al., 2016 - Google Patents
Securing app distribution process of iOS exploiting the notion of authentic updateAkter et al., 2016
- Document ID
- 7564820641373411387
- Author
- Akter S
- Rahman F
- Al Islam A
- Publication year
- Publication venue
- 2016 International Conference on Networking Systems and Security (NSysS)
External Links
Snippet
iOS is, perhaps, considered as one of the most secured and reliable operating systems available now-a-days. However, its loopholes are coming into light in recent times causing a few security breaches such as the Masque attack. Even though prompt and pragmatic fixes …
- 238000000034 method 0 title description 17
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11722521B2 (en) | Application firewall | |
Bhat et al. | A survey on various threats and current state of security in android platform | |
US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
US8909930B2 (en) | External reference monitor | |
Mohamed et al. | Android vs iOS security: A comparative study | |
Atanassov et al. | Mobile device threat: Malware | |
GB2574283A (en) | Detecting triggering events for distributed denial of service attacks | |
Mikhaylov et al. | Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices | |
Yadav et al. | A review on malware analysis for iot and android system | |
Kulkarni et al. | Open source android vulnerability detection tools: a survey | |
Zlatanov | Computer security and mobile security challenges | |
CN106971105B (en) | IOS-based application program defense method against false face attack | |
Powers et al. | Whitelist malware defense for embedded control system devices | |
Akter et al. | Securing app distribution process of iOS exploiting the notion of authentic update | |
Muttik | Securing mobile devices: Present and future | |
GB2572471A (en) | Detecting lateral movement by malicious applications | |
Hassan et al. | Enterprise Defense Strategies Against Ransomware Attacks: Protection Against Ransomware Attacks on Corporate Environment | |
Armin | Mobile threats and the underground marketplace | |
Walls et al. | A study of the effectiveness abs reliability of android free anti-mobile malware apps | |
Moran | Security for mobile ATE applications | |
Deep et al. | Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers | |
Kim et al. | StopBankun: Countermeasure of app replacement attack on Android | |
Sarga et al. | Mobile Cyberwarfare Threats and Mitigations: An Overview | |
Gupta et al. | A prototype method to discover malwares in Android-based smartphones through system calls |