Discussions about the Security Protection of the APP Utilization for Smartphones

碩士 === 國防大學 === 資訊管理學系 === 102 === The ancestor of smart phone virus is Cabir which was spotted in 2004 via scam emails. The hackers found that they can earn a great amount of money by sending fraud emails with viruses. According to the statistics of AV-TEST, the malicious viruses on Android smart p...

Full description

Bibliographic Details
Main Authors: Chen,Ming-Hao, 陳茗豪
Other Authors: Tai-kuo Wu
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/49626952372423189457
id ndltd-TW-102NDU00654014
record_format oai_dc
spelling ndltd-TW-102NDU006540142016-03-16T04:14:49Z http://ndltd.ncl.edu.tw/handle/49626952372423189457 Discussions about the Security Protection of the APP Utilization for Smartphones 智慧型手機使用APP之安全防護探討 Chen,Ming-Hao 陳茗豪 碩士 國防大學 資訊管理學系 102 The ancestor of smart phone virus is Cabir which was spotted in 2004 via scam emails. The hackers found that they can earn a great amount of money by sending fraud emails with viruses. According to the statistics of AV-TEST, the malicious viruses on Android smart phone have increased 14.1 times within six months in 2012. It was discovered that there are over 3000 Andriod smart phones, made by a famous smart phone company, are infected with virus before they are sole. All Apple iOS application programs must be customized based on security consideration. Also, those programs must be varied by Apple before they they are security enough for the users to download. However, there is no such a mechanism in the Android Market. Because Android is more elastic and flexible in terms of software design, which allow users to redesign and create more exciting programs. Although those application programs or games may look useful, they are usually the carriers of viruses. According to statistics, most Google Android viruses are disseminated via various application programs, including fraud game softwares, GPS positioners, electronic readers, and linking icons embedded on pictures, even the Google+ had been utilized by malicious programs. Therefore, it is an urgent issue to further discuss how to protect smart phone form threatened by malicious programs. The specification of smart phone malicious software detector brought up in the study is used as a concept of verification. The purpose of this study is to let users know the information security cognition and index of abnormal behavior when using APP software or other application programs. This study also provides users with assessment and consideration while they are choosing free or paid anti-virus software. In the future, further research and anlalysis shoule be conducted focusing on network abnormal behaviors, hoping to bring up more observation indicator or rules of detection, and evolved as an integration of auto-cognition indicator and network package software analysis integration, Finally to invent a mobile version of real time malicious application detector that is embedded on smart phones without wasting limited resources and to extend the scope of application, and to promote the gain of interest of smart phone information security protection. Tai-kuo Wu Lin Ming Chang 伍台國博士、 林明昌博士 2013 學位論文 ; thesis 110 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學 === 資訊管理學系 === 102 === The ancestor of smart phone virus is Cabir which was spotted in 2004 via scam emails. The hackers found that they can earn a great amount of money by sending fraud emails with viruses. According to the statistics of AV-TEST, the malicious viruses on Android smart phone have increased 14.1 times within six months in 2012. It was discovered that there are over 3000 Andriod smart phones, made by a famous smart phone company, are infected with virus before they are sole. All Apple iOS application programs must be customized based on security consideration. Also, those programs must be varied by Apple before they they are security enough for the users to download. However, there is no such a mechanism in the Android Market. Because Android is more elastic and flexible in terms of software design, which allow users to redesign and create more exciting programs. Although those application programs or games may look useful, they are usually the carriers of viruses. According to statistics, most Google Android viruses are disseminated via various application programs, including fraud game softwares, GPS positioners, electronic readers, and linking icons embedded on pictures, even the Google+ had been utilized by malicious programs. Therefore, it is an urgent issue to further discuss how to protect smart phone form threatened by malicious programs. The specification of smart phone malicious software detector brought up in the study is used as a concept of verification. The purpose of this study is to let users know the information security cognition and index of abnormal behavior when using APP software or other application programs. This study also provides users with assessment and consideration while they are choosing free or paid anti-virus software. In the future, further research and anlalysis shoule be conducted focusing on network abnormal behaviors, hoping to bring up more observation indicator or rules of detection, and evolved as an integration of auto-cognition indicator and network package software analysis integration, Finally to invent a mobile version of real time malicious application detector that is embedded on smart phones without wasting limited resources and to extend the scope of application, and to promote the gain of interest of smart phone information security protection.
author2 Tai-kuo Wu
author_facet Tai-kuo Wu
Chen,Ming-Hao
陳茗豪
author Chen,Ming-Hao
陳茗豪
spellingShingle Chen,Ming-Hao
陳茗豪
Discussions about the Security Protection of the APP Utilization for Smartphones
author_sort Chen,Ming-Hao
title Discussions about the Security Protection of the APP Utilization for Smartphones
title_short Discussions about the Security Protection of the APP Utilization for Smartphones
title_full Discussions about the Security Protection of the APP Utilization for Smartphones
title_fullStr Discussions about the Security Protection of the APP Utilization for Smartphones
title_full_unstemmed Discussions about the Security Protection of the APP Utilization for Smartphones
title_sort discussions about the security protection of the app utilization for smartphones
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/49626952372423189457
work_keys_str_mv AT chenminghao discussionsaboutthesecurityprotectionoftheapputilizationforsmartphones
AT chénmíngháo discussionsaboutthesecurityprotectionoftheapputilizationforsmartphones
AT chenminghao zhìhuìxíngshǒujīshǐyòngappzhīānquánfánghùtàntǎo
AT chénmíngháo zhìhuìxíngshǒujīshǐyòngappzhīānquánfánghùtàntǎo
_version_ 1718206576125280256