4.6 Article

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Journal

ELECTRONICS
Volume 11, Issue 15, Pages -

Publisher

MDPI
DOI: 10.3390/electronics11152354

Keywords

IoT; android system; malware; kernel-based attack; application attack; application hardening technique

Funding

  1. Deanship of Scientific Research at Majmaah University [R-2022-214]

Ask authors/readers for more resources

The Internet of Things (IoT) and Android operating system have made advanced technology accessible to the general public. This article provides a comprehensive study of the IoT and Android systems, including different attack classifications and mitigation strategies. It highlights the importance of secure application design and explores malware detection methods. This study expands the understanding of application-hardening strategies and aims to help experts and researchers design more efficient and robust solutions. It also discusses attack vectors and mitigation strategies for developers and the open domain.
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology. Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors. Due to the escalated growth of Android devices, users are facing cybercrime through their Android devices. This article aims to provide a comprehensive study of the IoT and Android systems. This article classifies different attacks on IoT and Android devices and mitigation strategies proposed by different researchers. The article emphasizes the role of the developer in secure application design. This article attempts to provide a relative analysis of several malware detection methods in the different environments of attacks. This study expands the awareness of certain application-hardening strategies applicable to IoT devices and Android applications and devices. This study will help domain experts and researchers to gain knowledge of IoT systems and Android systems from a security point of view and provide insight into how to design more efficient, robust, and comprehensive solutions. This article discusses different attack vectors and mitigation strategies available to both developers and in the open domain. Certain guidelines are also suggested for application and platform developers, as well as application databases (Google play store), to limit the risk of attack, and users can form their own defense with knowledge regarding keeping hardware and software updated and securing their system with a strong password.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available