International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 130 - Issue 5 |
Published: November 2015 |
Authors: Buthaina Mohammed Al-Zadjali |
![]() |
Buthaina Mohammed Al-Zadjali . A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach). International Journal of Computer Applications. 130, 5 (November 2015), 38-42. DOI=10.5120/ijca2015907005
@article{ 10.5120/ijca2015907005, author = { Buthaina Mohammed Al-Zadjali }, title = { A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach) }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 130 }, number = { 5 }, pages = { 38-42 }, doi = { 10.5120/ijca2015907005 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Buthaina Mohammed Al-Zadjali %T A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)%T %J International Journal of Computer Applications %V 130 %N 5 %P 38-42 %R 10.5120/ijca2015907005 %I Foundation of Computer Science (FCS), NY, USA
The Android platform is an open source operating system, which is widely used on Smartphones. Android operating system usage and adaptation is rapidly increasing with a variety of applications. It also, allows developers to freely access and modifies source code. The open nature of the Android platform attracts attackers to do different types of criminal activities. The android users likely to install and download many applications which can be contain malicious code written by software hackers. The purpose of this paper is to explore the most significant security threats and vulnerabilities in the Android Operating System.