Tertarik Menjadi Mobile Android Security? Inilah Beberapa Referensi Artikel Yang Bisa Kamu Pelajari.
![]() |
| Image from https://www.spaceotechnologies.com |
Untuk pembaca yang ingin mempelajari keamanan pada mobile android maka berikut adalah referensi beberapa artikel yang merupakan hasil riset dari beberapa sumber.
- Analysis of Secure Key Storage Solutions on Android
- Attacking The Linux PRNG on Android
- Android OEM's applications (in)security and backdoors without permission
- Attacks on Android Clipboard
- A Study of Android Application Security
- Attacks on Webview in the Android System
- Gues who's is Texting you?Evaluating Security of Smartphone Messaging Applications
- Evaluations of Security Solutions for Android Systems
- Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
- The Impact of Vendor Customizations on Android Security
- The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
- An Empirical Study of Cryptographic Misuse in Android Applications
- Android Permissions:User Attention, Comprehension, and Behavior
- AppsPlayground: Automatic Security Analysis of Smartphone Applications
- Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android
- Android Malware Situation
- PowerSpy: Location Tracking using Mobile Device Power Analysis
- EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
- Detecting Passive Content Leaks and Pollution in Android Applications
- DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform
- RiskRanker: Scalable and Accurate Zero-day Android Malware Detection
- DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
- Dissecting Android Malware: Characterization and Evolution
- Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
- Systematic Detection of Capability Leaks in Stock Android Smartphones
- Fast, Scalable Detection of “Piggybacked” Mobile Applications
- Leaving our ZIP undone: how to abuse ZIP to deliver malware apps
- Forensic Analysis On Android: A Practical Case
- A Machine Learning Approach to Android Malware Detection
- Cross Site Scripting Attacks on Android Webview
- Autonomous smartphone apps: self-compilation, mutation, and viral spreading
- BareDroid: Large-Scale Analysis of Android Apps on Real Devices
Jadi itulah artikel-artikel berdasarkan hasil riset dari berbagai sumber, mudah-mudahan bermanfaat untuk kita semua.Tunggu artikel,berita, dan tutorial menarik lainnya hanya di Siberelax .

Post a Comment