Android OS vulnerabilities :analysis and categorization
Android devices are increasingly used in everyday life. They incorporate most of our private data. This data becomes the target of attacks that exploit Android vulnerabilities. To this day, a study has not been carried out on all the vulnerabilities that affect the Android operating system. In addit...
- Autores:
-
Bautista Mora, Jairo Emilio
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2017
- Institución:
- Universidad de los Andes
- Repositorio:
- Séneca: repositorio Uniandes
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.uniandes.edu.co:1992/39703
- Acceso en línea:
- http://hdl.handle.net/1992/39703
- Palabra clave:
- Android (Recurso electrónico)
Protección de datos
Fallas de sistema para computadora
Ingeniería
- Rights
- openAccess
- License
- http://creativecommons.org/licenses/by-nc-nd/4.0/
Summary: | Android devices are increasingly used in everyday life. They incorporate most of our private data. This data becomes the target of attacks that exploit Android vulnerabilities. To this day, a study has not been carried out on all the vulnerabilities that affect the Android operating system. In addition, there is no official taxonomy to catalog vulnerabilities, and there is no way to detect it at the time of development. The objective of this study is to (i) define the taxonomy of the types of vulnerabilities related to Android; (ii) investigate the layers and subsystems impacted by Android; (iii) study the survival of vulnerabilities; (iv) analyze the evolution of these vulnerabilities; and (v) determine the correlation between vulnerability types and CVSS vectors. These findings would be the starting point to improve the development process for Android and define a way to detect vulnerabilities during development |
---|