{"title":"Multilayered Risk analysis of Mobile systems and Apps","authors":"R. Katarya, Chhavi Jain","doi":"10.1109/ICCMC.2018.8487535","DOIUrl":null,"url":null,"abstract":"Mobile systems and applications face a number of vulnerabilities that can lead to a breach of confidentiality of information. Users these days rely more on mobile systems and various applications for their day to day activities. Different applications can pose different risks to the security of mobile systems and can sometimes become the cause of other vulnerabilities as well. This paper presents and reviews risk analysis done at various levels in mobile systems, namely, the static analysis layer, dynamic analysis layer and the behavioral analysis layer. Risk can propagate through these layers and various techniques and approaches have been proposed to evaluate such potential risks. These strategies can help improve the security of mobile applications as well as the entire mobile applications.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"64-67"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Mobile systems and applications face a number of vulnerabilities that can lead to a breach of confidentiality of information. Users these days rely more on mobile systems and various applications for their day to day activities. Different applications can pose different risks to the security of mobile systems and can sometimes become the cause of other vulnerabilities as well. This paper presents and reviews risk analysis done at various levels in mobile systems, namely, the static analysis layer, dynamic analysis layer and the behavioral analysis layer. Risk can propagate through these layers and various techniques and approaches have been proposed to evaluate such potential risks. These strategies can help improve the security of mobile applications as well as the entire mobile applications.