Android操作系统漏洞分类

K. A. Cherepanov
{"title":"Android操作系统漏洞分类","authors":"K. A. Cherepanov","doi":"10.32460/ISHMU-2020-8-0019","DOIUrl":null,"url":null,"abstract":"The paper identifies the problem of protection of information systems, which have in their structure devices running the Android operating system. A mechanism is proposed for translation foreign experience to conditions specific for the regulatory and organizational methods used in the Russian Federation. The mechanism creates the interactive map of vulnerabilities of the Android OS. The CVE records were grouped according to the Android OS levels. As a result, the need of further research was defined for identifying factors affecting the number of the Android OS vulnerabilities of a specific level. A structure of record has been formed that can be used to build the interactive vulnerability map of the Android OS.","PeriodicalId":154439,"journal":{"name":"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Classification of vulnerabilities of the Android OS\",\"authors\":\"K. A. Cherepanov\",\"doi\":\"10.32460/ISHMU-2020-8-0019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper identifies the problem of protection of information systems, which have in their structure devices running the Android operating system. A mechanism is proposed for translation foreign experience to conditions specific for the regulatory and organizational methods used in the Russian Federation. The mechanism creates the interactive map of vulnerabilities of the Android OS. The CVE records were grouped according to the Android OS levels. As a result, the need of further research was defined for identifying factors affecting the number of the Android OS vulnerabilities of a specific level. A structure of record has been formed that can be used to build the interactive vulnerability map of the Android OS.\",\"PeriodicalId\":154439,\"journal\":{\"name\":\"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32460/ISHMU-2020-8-0019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32460/ISHMU-2020-8-0019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文明确了运行Android操作系统的信息系统的结构保护问题。建议建立一种机制,将外国经验转化为俄罗斯联邦所使用的管理和组织方法的具体条件。该机制创建了Android操作系统漏洞的交互式地图。根据Android操作系统级别对CVE记录进行分组。因此,需要进一步研究以确定影响特定级别Android操作系统漏洞数量的因素。形成了一个记录结构,可用于构建Android操作系统的交互漏洞图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Classification of vulnerabilities of the Android OS
The paper identifies the problem of protection of information systems, which have in their structure devices running the Android operating system. A mechanism is proposed for translation foreign experience to conditions specific for the regulatory and organizational methods used in the Russian Federation. The mechanism creates the interactive map of vulnerabilities of the Android OS. The CVE records were grouped according to the Android OS levels. As a result, the need of further research was defined for identifying factors affecting the number of the Android OS vulnerabilities of a specific level. A structure of record has been formed that can be used to build the interactive vulnerability map of the Android OS.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信