TY - GEN
T1 - Mobile application security
T2 - International IoT, Electronics and Mechatronics Conference, IEMTRONICS 2024
AU - Mira, Fahad
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025/1/30
Y1 - 2025/1/30
N2 - Regular mobile phones to smart phones are phenomenal because massive leap in capabilities. The abundance of applications available for download and installation is one of the main selling points of smart phones. But it also means that malicious software may be readily distributed to smart phones, allowing hackers to launch a variety of attacks. Effective detection procedures and preventative measures should be taken to deal with this problem. The reasons why cell phones are susceptible to security breaches are initially covered in this article. After then, it shows signs of malicious behavior and virus threats. After that, it takes a look back at the methods currently used to identify and stop malware. It highlights the need for additional research in these areas, as well as the efforts of app developers, app store authorities, and users to protect themselves from this type of malware.
AB - Regular mobile phones to smart phones are phenomenal because massive leap in capabilities. The abundance of applications available for download and installation is one of the main selling points of smart phones. But it also means that malicious software may be readily distributed to smart phones, allowing hackers to launch a variety of attacks. Effective detection procedures and preventative measures should be taken to deal with this problem. The reasons why cell phones are susceptible to security breaches are initially covered in this article. After then, it shows signs of malicious behavior and virus threats. After that, it takes a look back at the methods currently used to identify and stop malware. It highlights the need for additional research in these areas, as well as the efforts of app developers, app store authorities, and users to protect themselves from this type of malware.
UR - https://www.scopus.com/pages/publications/85218504120
U2 - 10.1007/978-981-97-4780-1_35
DO - 10.1007/978-981-97-4780-1_35
M3 - Conference contribution
AN - SCOPUS:85218504120
SN - 9789819747795
T3 - Lecture Notes in Electrical Engineering
SP - 461
EP - 473
BT - Proceedings of IEMTRONICS 2024 - International IoT, Electronics and Mechatronics Conference
A2 - Bradford, Phillip G.
A2 - Gadsden, S. Andrew
A2 - Koul, Shiban K.
A2 - Ghatak, Kamakhya Prasad
PB - Springer
Y2 - 3 April 2024 through 5 April 2024
ER -