Akter et al., 2016 - Google Patents

Securing app distribution process of iOS exploiting the notion of authentic update

Akter et al., 2016

Document ID
7564820641373411387
Author
Akter S
Rahman F
Al Islam A
Publication year
Publication venue
2016 International Conference on Networking Systems and Security (NSysS)

External Links

Snippet

iOS is, perhaps, considered as one of the most secured and reliable operating systems available now-a-days. However, its loopholes are coming into light in recent times causing a few security breaches such as the Masque attack. Even though prompt and pragmatic fixes …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
US11722521B2 (en) Application firewall
Bhat et al. A survey on various threats and current state of security in android platform
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
US8909930B2 (en) External reference monitor
Mohamed et al. Android vs iOS security: A comparative study
Atanassov et al. Mobile device threat: Malware
GB2574283A (en) Detecting triggering events for distributed denial of service attacks
Mikhaylov et al. Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices
Yadav et al. A review on malware analysis for iot and android system
Kulkarni et al. Open source android vulnerability detection tools: a survey
Zlatanov Computer security and mobile security challenges
CN106971105B (en) IOS-based application program defense method against false face attack
Powers et al. Whitelist malware defense for embedded control system devices
Akter et al. Securing app distribution process of iOS exploiting the notion of authentic update
Muttik Securing mobile devices: Present and future
GB2572471A (en) Detecting lateral movement by malicious applications
Hassan et al. Enterprise Defense Strategies Against Ransomware Attacks: Protection Against Ransomware Attacks on Corporate Environment
Armin Mobile threats and the underground marketplace
Walls et al. A study of the effectiveness abs reliability of android free anti-mobile malware apps
Moran Security for mobile ATE applications
Deep et al. Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers
Kim et al. StopBankun: Countermeasure of app replacement attack on Android
Sarga et al. Mobile Cyberwarfare Threats and Mitigations: An Overview
Gupta et al. A prototype method to discover malwares in Android-based smartphones through system calls