Discussions about the Security Protection of the APP Utilization for Smartphones
碩士 === 國防大學 === 資訊管理學系 === 102 === The ancestor of smart phone virus is Cabir which was spotted in 2004 via scam emails. The hackers found that they can earn a great amount of money by sending fraud emails with viruses. According to the statistics of AV-TEST, the malicious viruses on Android smart p...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/49626952372423189457 |
id |
ndltd-TW-102NDU00654014 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NDU006540142016-03-16T04:14:49Z http://ndltd.ncl.edu.tw/handle/49626952372423189457 Discussions about the Security Protection of the APP Utilization for Smartphones 智慧型手機使用APP之安全防護探討 Chen,Ming-Hao 陳茗豪 碩士 國防大學 資訊管理學系 102 The ancestor of smart phone virus is Cabir which was spotted in 2004 via scam emails. The hackers found that they can earn a great amount of money by sending fraud emails with viruses. According to the statistics of AV-TEST, the malicious viruses on Android smart phone have increased 14.1 times within six months in 2012. It was discovered that there are over 3000 Andriod smart phones, made by a famous smart phone company, are infected with virus before they are sole. All Apple iOS application programs must be customized based on security consideration. Also, those programs must be varied by Apple before they they are security enough for the users to download. However, there is no such a mechanism in the Android Market. Because Android is more elastic and flexible in terms of software design, which allow users to redesign and create more exciting programs. Although those application programs or games may look useful, they are usually the carriers of viruses. According to statistics, most Google Android viruses are disseminated via various application programs, including fraud game softwares, GPS positioners, electronic readers, and linking icons embedded on pictures, even the Google+ had been utilized by malicious programs. Therefore, it is an urgent issue to further discuss how to protect smart phone form threatened by malicious programs. The specification of smart phone malicious software detector brought up in the study is used as a concept of verification. The purpose of this study is to let users know the information security cognition and index of abnormal behavior when using APP software or other application programs. This study also provides users with assessment and consideration while they are choosing free or paid anti-virus software. In the future, further research and anlalysis shoule be conducted focusing on network abnormal behaviors, hoping to bring up more observation indicator or rules of detection, and evolved as an integration of auto-cognition indicator and network package software analysis integration, Finally to invent a mobile version of real time malicious application detector that is embedded on smart phones without wasting limited resources and to extend the scope of application, and to promote the gain of interest of smart phone information security protection. Tai-kuo Wu Lin Ming Chang 伍台國博士、 林明昌博士 2013 學位論文 ; thesis 110 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學 === 資訊管理學系 === 102 === The ancestor of smart phone virus is Cabir which was spotted in 2004 via scam emails. The hackers found that they can earn a great amount of money by sending fraud emails with viruses.
According to the statistics of AV-TEST, the malicious viruses on Android smart phone have increased 14.1 times within six months in 2012. It was discovered that there are over 3000 Andriod smart phones, made by a famous smart phone company, are infected with virus before they are sole.
All Apple iOS application programs must be customized based on security consideration. Also, those programs must be varied by Apple before they they are security enough for the users to download. However, there is no such a mechanism in the Android Market. Because Android is more elastic and flexible in terms of software design, which allow users to redesign and create more exciting programs. Although those application programs or games may look useful, they are usually the carriers of viruses.
According to statistics, most Google Android viruses are disseminated via various application programs, including fraud game softwares, GPS positioners, electronic readers, and linking icons embedded on pictures, even the Google+ had been utilized by malicious programs. Therefore, it is an urgent issue to further discuss how to protect smart phone form threatened by malicious programs.
The specification of smart phone malicious software detector brought up in the study is used as a concept of verification. The purpose of this study is to let users know the information security cognition and index of abnormal behavior when using APP software or other application programs. This study also provides users with assessment and consideration while they are choosing free or paid anti-virus software.
In the future, further research and anlalysis shoule be conducted focusing on network abnormal behaviors, hoping to bring up more observation indicator or rules of detection, and evolved as an integration of auto-cognition indicator and network package software analysis integration, Finally to invent a mobile version of real time malicious application detector that is embedded on smart phones without wasting limited resources and to extend the scope of application, and to promote the gain of interest of smart phone information security protection.
|
author2 |
Tai-kuo Wu |
author_facet |
Tai-kuo Wu Chen,Ming-Hao 陳茗豪 |
author |
Chen,Ming-Hao 陳茗豪 |
spellingShingle |
Chen,Ming-Hao 陳茗豪 Discussions about the Security Protection of the APP Utilization for Smartphones |
author_sort |
Chen,Ming-Hao |
title |
Discussions about the Security Protection of the APP Utilization for Smartphones |
title_short |
Discussions about the Security Protection of the APP Utilization for Smartphones |
title_full |
Discussions about the Security Protection of the APP Utilization for Smartphones |
title_fullStr |
Discussions about the Security Protection of the APP Utilization for Smartphones |
title_full_unstemmed |
Discussions about the Security Protection of the APP Utilization for Smartphones |
title_sort |
discussions about the security protection of the app utilization for smartphones |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/49626952372423189457 |
work_keys_str_mv |
AT chenminghao discussionsaboutthesecurityprotectionoftheapputilizationforsmartphones AT chénmíngháo discussionsaboutthesecurityprotectionoftheapputilizationforsmartphones AT chenminghao zhìhuìxíngshǒujīshǐyòngappzhīānquánfánghùtàntǎo AT chénmíngháo zhìhuìxíngshǒujīshǐyòngappzhīānquánfánghùtàntǎo |
_version_ |
1718206576125280256 |