{"title":"一种通过权限管理来解决基于Android操作系统的应用程序漏洞的方法","authors":"B. V. Hoholʹ","doi":"10.31673/2409-7292.2022.024552","DOIUrl":null,"url":null,"abstract":"The article explores vulnerabilities and ways to protect mobile applications based on the Android operating system. The security problem has been investigated and various types of mobile application security threats have been analyzed. On the basis of the research carried out in the article, recommendations have been developed for the protection of mobile applications from cyber attacks by means of permission management.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"73 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A method of countering the vulnerabilities of applications based on the Android operating system through permission management\",\"authors\":\"B. V. Hoholʹ\",\"doi\":\"10.31673/2409-7292.2022.024552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article explores vulnerabilities and ways to protect mobile applications based on the Android operating system. The security problem has been investigated and various types of mobile application security threats have been analyzed. On the basis of the research carried out in the article, recommendations have been developed for the protection of mobile applications from cyber attacks by means of permission management.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"73 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.024552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.024552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A method of countering the vulnerabilities of applications based on the Android operating system through permission management
The article explores vulnerabilities and ways to protect mobile applications based on the Android operating system. The security problem has been investigated and various types of mobile application security threats have been analyzed. On the basis of the research carried out in the article, recommendations have been developed for the protection of mobile applications from cyber attacks by means of permission management.