Penetration Testing for Android Smartphones
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3
Abstract
One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems have all tripled and many have depended on it for their daily transactions.AndroidOS on smartphones is so popular today that it has beaten the most popular mobile operating systems, like RIM, iOS, Windows Mobile and even Symbian, which ruled the mobile market for more than a decade.This paper performspenetration testing of Android-based Smartphones using an application program designed to simplify port-scanning techniques for information gathering and vulnerability attack. In this paper, an attempt was made to test and analyze the security architecture of the Android operating system using the latest penetration testing and vulnerability tool based on Kali Linux. Three different Versions of Android, Version 2.3, 3.2 and 4.2 were simulated on a virtual machine
Authors and Affiliations
Okolie C. C
Cloud stream: Delivering high-quality streaming videos througha cloud-based svc proxy
Abstract: Mobile phones are among the most popular consumer devices, and the recent development of 3G networks, rapidly increasing power of personal mobile devices (smart phones, tablets, etc.) is providing much ri...
Cloud Computing: Overview & Utility
Abstract: Cloud computing enables the process of storing documents, files photos online instead of using homecomputer, or webmail or a social networking site. If in an organization, it is desired to use an online i...
An Energy Efficient Dc Lighting Grid Using IOT
This paper highlights the benefits and possible drawbacks of a DC-based lighting infrastructure for powering Light Emitting Diode (LED)-lamps. It also evaluates the efforts needed for integrating the so called smart ligh...
Variance-Index Based Feature Selection Algorithm for Network Intrusion Detection
Abstract: This paper presents a feature selection methodology in the domain of Network Intrusion Detection System (NIDS). An Unsupervised Variance Indexed Feature Selection Algorithm (VIFS) is proposed and demonstrated b...
A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures
Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these t...