Comparative analysis of Android and iOS from security viewpoint
Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with the computational power to handle a wide array of applications attracts millions of users worldwide, also raises the security concerns on thes...
Uložené v:
| Vydané v: | Computer science review Ročník 40; s. 100372 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Inc
01.05.2021
|
| Predmet: | |
| ISSN: | 1574-0137, 1876-7745 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with the computational power to handle a wide array of applications attracts millions of users worldwide, also raises the security concerns on these platforms. This paper presents a comparative analysis between Android and iOS on a wide range of security aspects. It analyzes data for the period 2015-2019 and gives a detailed snapshot of not only the quantum of vulnerabilities, but also their impact. In addition, the paper leverages the well-established security triad i.e. CIA (Confidentiality, Integrity, Availability) to compare both the operating systems. The comprehensive and pragmatic approach taken in the paper makes it easier to infer that Android is more susceptible to security breaches and malware attacks as compared to iOS. Hence, researchers should divert their efforts and focus on finding solutions to problems pertaining to Android. The paper concludes by laying down future research directions and scope of work, which can be leveraged not only by application developers, but also by researchers. This will help make Android safer for users and will further increase its demand as a mobile operating system. |
|---|---|
| AbstractList | Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with the computational power to handle a wide array of applications attracts millions of users worldwide, also raises the security concerns on these platforms. This paper presents a comparative analysis between Android and iOS on a wide range of security aspects. It analyzes data for the period 2015-2019 and gives a detailed snapshot of not only the quantum of vulnerabilities, but also their impact. In addition, the paper leverages the well-established security triad i.e. CIA (Confidentiality, Integrity, Availability) to compare both the operating systems. The comprehensive and pragmatic approach taken in the paper makes it easier to infer that Android is more susceptible to security breaches and malware attacks as compared to iOS. Hence, researchers should divert their efforts and focus on finding solutions to problems pertaining to Android. The paper concludes by laying down future research directions and scope of work, which can be leveraged not only by application developers, but also by researchers. This will help make Android safer for users and will further increase its demand as a mobile operating system. |
| ArticleNumber | 100372 |
| Author | Baliyan, Niyati Garg, Shivi |
| Author_xml | – sequence: 1 givenname: Shivi orcidid: 0000-0002-1698-1005 surname: Garg fullname: Garg, Shivi email: shivi002phd16@igdtuw.ac.in organization: Faculty of Computer Engineering, J.C. Bose University of Science and Technology, YMCA, Faridabad, India – sequence: 2 givenname: Niyati orcidid: 0000-0002-2019-5381 surname: Baliyan fullname: Baliyan, Niyati email: niyatibaliyan@igdtuw.ac.in organization: Information Technology Department, Indira Gandhi Delhi Technical University for Women, Delhi, India |
| BookMark | eNqFkMtKQzEURYNUsFX_wEF-4NaTx01aB0opvqDQgToOuXlASpuU5Frp35tyHTnQ0TlsWBvWnqBRTNEhdENgSoCI283UpJLdYUqBkhoBk_QMjclMikZK3o7q30reAGHyAk1K2QBIgFaM0cMy7fY66z4cHNZRb48lFJw8XkSbU7A1szis37DPaYeLM5859Ed8CO5rn0Lsr9C519virn_uJfp4enxfvjSr9fPrcrFqDAPRN9R30nA9M-CdJ3PuoSOcUzdnnmohiW95J2Zs3kkrmJdcGNNxaJ1lTFPetewS8aHX5FSqq1f7HHY6HxUBdRpBbdQwgjqNoIYRKnb3CzOhr7Ip9lmH7X_w_QC7KlaNsyomuGicDdmZXtkU_i74BhzAfRM |
| CitedBy_id | crossref_primary_10_1016_j_jisa_2024_103741 crossref_primary_10_3390_electronics14142763 crossref_primary_10_1007_s11235_022_00983_2 crossref_primary_10_1016_j_eswa_2021_116360 crossref_primary_10_3390_s23218749 crossref_primary_10_1002_sd_2995 crossref_primary_10_1108_ET_04_2023_0128 crossref_primary_10_1038_s41746_025_01595_1 crossref_primary_10_3390_s25041153 crossref_primary_10_48017_dj_v10i1_3146 crossref_primary_10_3390_electronics10131606 crossref_primary_10_1007_s11416_023_00477_y crossref_primary_10_1186_s40561_022_00199_6 crossref_primary_10_1007_s10209_025_01221_7 crossref_primary_10_1007_s42044_023_00136_x crossref_primary_10_3390_info14080457 crossref_primary_10_1145_3556974 crossref_primary_10_1007_s12525_025_00788_6 crossref_primary_10_1145_3617177 crossref_primary_10_3390_technologies11030076 crossref_primary_10_1109_ACCESS_2024_3485706 crossref_primary_10_1016_j_sysarc_2025_103547 crossref_primary_10_1016_j_cosrev_2022_100529 crossref_primary_10_1109_ACCESS_2022_3181605 crossref_primary_10_1111_exsy_13482 crossref_primary_10_1016_j_bjps_2025_06_011 crossref_primary_10_2174_0126662558308040241009061506 crossref_primary_10_3390_app13053061 |
| Cites_doi | 10.1109/TIFS.2015.2436364 10.1186/s13638-016-0720-3 10.1007/s11219-017-9368-4 10.1016/j.cosrev.2019.05.002 10.1016/j.cosrev.2019.01.002 10.1145/3339252.3340340 10.1016/j.procs.2011.07.071 10.1016/j.future.2019.03.007 10.1016/j.dib.2018.12.038 10.1007/s11235-019-00575-7 10.1007/s11277-017-4366-1 10.1016/j.compeleceng.2019.04.019 10.1007/s10207-017-0398-5 10.1145/3382158 10.1016/j.diin.2014.01.001 |
| ContentType | Journal Article |
| Copyright | 2021 Elsevier Inc. |
| Copyright_xml | – notice: 2021 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.cosrev.2021.100372 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1876-7745 |
| ExternalDocumentID | 10_1016_j_cosrev_2021_100372 S1574013721000125 |
| GroupedDBID | --K --M .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 6J9 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABBOA ABFRF ABJNI ABMAC ABUCO ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADMUD AEBSH AEFWE AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM AXJTR BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN GBLVA GBOLZ HAMUX HVGLF HZ~ IHE J1W KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 RIG ROL RPZ SDF SDG SES SPC SPCBC SSB SSD SSV SSZ T5K UNMZH ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-2fb7c4a8c0fef194f0b1442e93f2a671f54b6839b7d63f746ccb405ed33a24b53 |
| ISICitedReferencesCount | 50 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000656789000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1574-0137 |
| IngestDate | Sat Nov 29 07:03:52 EST 2025 Tue Nov 18 22:17:18 EST 2025 Fri Feb 23 02:40:57 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | Smartphones Malware iOS Security Vulnerabilities Android |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-2fb7c4a8c0fef194f0b1442e93f2a671f54b6839b7d63f746ccb405ed33a24b53 |
| ORCID | 0000-0002-2019-5381 0000-0002-1698-1005 |
| ParticipantIDs | crossref_primary_10_1016_j_cosrev_2021_100372 crossref_citationtrail_10_1016_j_cosrev_2021_100372 elsevier_sciencedirect_doi_10_1016_j_cosrev_2021_100372 |
| PublicationCentury | 2000 |
| PublicationDate | May 2021 2021-05-00 |
| PublicationDateYYYYMMDD | 2021-05-01 |
| PublicationDate_xml | – month: 05 year: 2021 text: May 2021 |
| PublicationDecade | 2020 |
| PublicationTitle | Computer science review |
| PublicationYear | 2021 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Tung (b3) 2020 Shen, Wang (b25) 2017 Pieterse, Olivier, van Heerden (b28) 2018 Clement (b4) 2020 Diaz (b20) 2020 Zhang (b6) 2018 Shrestha, Ma, Zhu, Li, Saxena (b9) 2015; 10 Popescu (b33) 2018; 7 Grønli, Hansen, Ghinea, Younas (b18) 2014 Lutaaya (b27) 2018 Pierazzi, Mezzour, Han, Colajanni, Subrahmanian (b38) 2020; 11 Ahvanooey, Li, Rabbani, Rajput (b7) 2020 Hidhaya, Geetha (b5) 2017 Teufl, Zefferer, Stromberger (b14) 2013 Clement (b40) 2020 Talal, Zaidan, Zaidan, Albahri, Alsalem, Albahri, Alaa (b8) 2019; 72 Szongott, Henne, Smith (b13) 2012 Loftus, Baumann, van Galen, de Vries (b19) 2017 Kumar, Goyal (b30) 2019; 33 Lim, Yi (b39) 2016; 1 Bhatt, Gupta (b22) 2017; 96 Werthmann, Hund, Davi, Sadeghi, Holz (b23) 2013 Garg, Singh, Mohapatra (b31) 2019; 28 Davi, Dmitrienko, Sadeghi, Winandy (b21) 2011 MacDuffie, Morreale (b26) 2016 Opoku, Davis, Nimbe (b29) 2016 A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6) pp. 719–738. Qamar, Karim, Chang (b37) 2019; 97 (b2) 2020 Garg, Baliyan (b43) 2021 Zdziarski (b16) 2014; 11 Cho, Seo (b12) 2015; 9 Garg, Baliyan (b41) 2019; 77 O’Dea (b1) 2020 Yan, Yan (b35) 2018; 26 Chakkaravarthy, Sangeetha, Vaidehi (b34) 2019; 32 Garg, Baliyan (b42) 2019; 22 Rashidi, Fung (b11) 2015; 6 Salerno, Sanzgiri, Upadhyaya (b15) 2011; 5 T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryption: Information leakage through unencrypted metadata, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1–7. Wang (b17) 2017 (b32) 2020 Lee, Ju (b10) 2013 Chakkaravarthy (10.1016/j.cosrev.2021.100372_b34) 2019; 32 Shrestha (10.1016/j.cosrev.2021.100372_b9) 2015; 10 Qamar (10.1016/j.cosrev.2021.100372_b37) 2019; 97 Davi (10.1016/j.cosrev.2021.100372_b21) 2011 Garg (10.1016/j.cosrev.2021.100372_b43) 2021 Loftus (10.1016/j.cosrev.2021.100372_b19) 2017 Bhatt (10.1016/j.cosrev.2021.100372_b22) 2017; 96 Zdziarski (10.1016/j.cosrev.2021.100372_b16) 2014; 11 Werthmann (10.1016/j.cosrev.2021.100372_b23) 2013 Kumar (10.1016/j.cosrev.2021.100372_b30) 2019; 33 Hidhaya (10.1016/j.cosrev.2021.100372_b5) 2017 Garg (10.1016/j.cosrev.2021.100372_b31) 2019; 28 Garg (10.1016/j.cosrev.2021.100372_b42) 2019; 22 Shen (10.1016/j.cosrev.2021.100372_b25) 2017 Lim (10.1016/j.cosrev.2021.100372_b39) 2016; 1 Tung (10.1016/j.cosrev.2021.100372_b3) 2020 Salerno (10.1016/j.cosrev.2021.100372_b15) 2011; 5 10.1016/j.cosrev.2021.100372_b24 Zhang (10.1016/j.cosrev.2021.100372_b6) 2018 Rashidi (10.1016/j.cosrev.2021.100372_b11) 2015; 6 Szongott (10.1016/j.cosrev.2021.100372_b13) 2012 Garg (10.1016/j.cosrev.2021.100372_b41) 2019; 77 Pierazzi (10.1016/j.cosrev.2021.100372_b38) 2020; 11 Clement (10.1016/j.cosrev.2021.100372_b40) 2020 Lee (10.1016/j.cosrev.2021.100372_b10) 2013 Teufl (10.1016/j.cosrev.2021.100372_b14) 2013 (10.1016/j.cosrev.2021.100372_b32) 2020 Lutaaya (10.1016/j.cosrev.2021.100372_b27) 2018 O’Dea (10.1016/j.cosrev.2021.100372_b1) 2020 Cho (10.1016/j.cosrev.2021.100372_b12) 2015; 9 Talal (10.1016/j.cosrev.2021.100372_b8) 2019; 72 Grønli (10.1016/j.cosrev.2021.100372_b18) 2014 Ahvanooey (10.1016/j.cosrev.2021.100372_b7) 2020 Yan (10.1016/j.cosrev.2021.100372_b35) 2018; 26 MacDuffie (10.1016/j.cosrev.2021.100372_b26) 2016 Popescu (10.1016/j.cosrev.2021.100372_b33) 2018; 7 Diaz (10.1016/j.cosrev.2021.100372_b20) 2020 Pieterse (10.1016/j.cosrev.2021.100372_b28) 2018 Opoku (10.1016/j.cosrev.2021.100372_b29) 2016 Clement (10.1016/j.cosrev.2021.100372_b4) 2020 (10.1016/j.cosrev.2021.100372_b2) 2020 Wang (10.1016/j.cosrev.2021.100372_b17) 2017 10.1016/j.cosrev.2021.100372_b36 |
| References_xml | – year: 2020 ident: b3 article-title: Bigger than Windows, bigger than iOS: Google now has 2.5 billion active Android devices – start-page: 234 year: 2016 end-page: 259 ident: b29 article-title: Security evaluation of the smartphone platforms: A case study with Android, iOS and Windows phones publication-title: Asian J. Math. Comput. Res. – volume: 22 start-page: 1081 year: 2019 end-page: 1087 ident: b42 article-title: Data on vulnerability detection in android publication-title: Data Brief – volume: 1 start-page: 221 year: 2016 ident: b39 article-title: Structural analysis of packing schemes for extracting hidden codes in mobile malware publication-title: EURASIP J. Wireless Commun. Networking – start-page: 13 year: 2013 end-page: 24 ident: b23 article-title: PSiOS: bring your own privacy & security to iOS devices publication-title: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security – year: 2020 ident: b7 article-title: A survey on smartphones security: Software vulnerabilities, malware, and attacks – volume: 6 start-page: 3 year: 2015 end-page: 35 ident: b11 article-title: A survey of Android security threats and defenses publication-title: JoWUA – volume: 11 start-page: 3 year: 2014 end-page: 19 ident: b16 article-title: Identifying back doors attack points and surveillance mechanisms in iOS devices publication-title: Digit. Invest. – volume: 11 start-page: 1 year: 2020 end-page: 38 ident: b38 article-title: A data-driven characterization of modern Android Spyware publication-title: ACM Trans. Manage. Inform. Syst. (TMIS) – volume: 77 start-page: 12 year: 2019 end-page: 26 ident: b41 article-title: A novel parallel classifier scheme for vulnerability detection in android publication-title: Comput. Electr. Eng. – start-page: 635 year: 2014 end-page: 641 ident: b18 article-title: Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS publication-title: IEEE 28th International Conference on Advanced Information Networking and Applications – volume: 33 start-page: 1 year: 2019 end-page: 48 ident: b30 article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: A survey publication-title: Comp. Sci. Rev. – start-page: 203 year: 2013 end-page: 216 ident: b14 article-title: Mobile device encryption systems publication-title: IFIP International Information Security Conference – year: 2020 ident: b20 article-title: IOS security - iOS 11 – start-page: 357 year: 2017 end-page: 364 ident: b5 article-title: Detection of vulnerabilities caused by webview exploitation in smartphone publication-title: Ninth International Conference on Advanced Computing (ICoAC) – reference: T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryption: Information leakage through unencrypted metadata, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1–7. – volume: 96 start-page: 4013 year: 2017 end-page: 4046 ident: b22 article-title: Comparison of static and dynamic analyzer tools for iOS applications publication-title: Wirel. Pers. Commun. – start-page: 1 year: 2018 end-page: 6 ident: b27 article-title: Rethinking app permissions on iOS publication-title: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems – volume: 28 start-page: 1 year: 2019 end-page: 19 ident: b31 article-title: Analysis of software vulnerability classification based on different technical parameters publication-title: Inform. Secur. J.: Glob. Perspect. – start-page: 346 year: 2011 end-page: 360 ident: b21 article-title: Privilege escalation attacks on android publication-title: Information Security – volume: 7 start-page: 25 year: 2018 end-page: 32 ident: b33 article-title: The influence of vulnerabilities on the information systems and methods of prevention publication-title: Int. J. Inform. Secur. Cybercrime (IJISC) – year: 2020 ident: b40 article-title: Development of new Android malware worldwide from 2016 to 2019 (in millions) – volume: 10 start-page: 2270 year: 2015 end-page: 2283 ident: b9 article-title: Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware publication-title: IEEE Trans. Inf. Forensics Secur. – start-page: 89 year: 2018 end-page: 103 ident: b28 article-title: Detecting manipulated smartphone data on Android and iOS devices publication-title: International Information Security Conference – start-page: 57 year: 2016 end-page: 64 ident: b26 article-title: Comparing android app permissions publication-title: International Conference of Design, User Experience, and Usability – year: 2020 ident: b32 article-title: CVE details – year: 2020 ident: b4 article-title: Mobile app downloads worldwide from 2018 to 2024, by store – year: 2021 ident: b43 article-title: Android malware classification using ensemble classifiers publication-title: Cloud Security: Concepts, Applications and Perspectives, Chapter 13 – year: 2018 ident: b6 article-title: Smartphone App Security: Vulnerabilities and Implementations – start-page: 270 year: 2013 ident: b10 article-title: Assessment of malicious applications using permissions and enhanced user interfaces on android publication-title: IEEE International Conference on Intelligence and Security Informatics (ISI) – start-page: 443 year: 2012 end-page: 450 ident: b13 article-title: Evaluating the threat of epidemic mobile malware publication-title: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) – volume: 9 year: 2015 ident: b12 article-title: A strengthened Android signature management method publication-title: KSII Trans. Internet Inform. Syst. – reference: A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6) pp. 719–738. – volume: 97 start-page: 887 year: 2019 end-page: 909 ident: b37 article-title: Mobile malware attacks: Review, taxonomy & future directions publication-title: Future Gener. Comput. Syst. – year: 2017 ident: b19 article-title: Android 7 file based encryption and the attacks against it – year: 2020 ident: b1 article-title: Number of mobile phone users worldwide from 2016 to 2021 (in billions) – volume: 72 start-page: 285 year: 2019 end-page: 337 ident: b8 article-title: Comprehensive review and analysis of anti-malware apps for smartphones publication-title: Telecommun. Syst. – volume: 5 start-page: 546 year: 2011 end-page: 553 ident: b15 article-title: Exploration of attacks on current generation smartphones publication-title: Procedia Comput. Sci. – start-page: 366 year: 2017 end-page: 370 ident: b25 article-title: Enhancing data security of iOS client by encryption algorithm publication-title: IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) – year: 2017 ident: b17 article-title: Introduction to Computing Applications in Forestry and Natural Resource Management – volume: 26 start-page: 891 year: 2018 end-page: 919 ident: b35 article-title: A survey on dynamic mobile malware detection publication-title: Softw. Qual. J. – year: 2020 ident: b2 article-title: Mobile operating system market share worldwide – volume: 32 start-page: 1 year: 2019 end-page: 23 ident: b34 article-title: A survey on malware analysis and mitigation techniques publication-title: Comp. Sci. Rev. – year: 2021 ident: 10.1016/j.cosrev.2021.100372_b43 article-title: Android malware classification using ensemble classifiers – volume: 10 start-page: 2270 year: 2015 ident: 10.1016/j.cosrev.2021.100372_b9 article-title: Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2436364 – volume: 1 start-page: 221 year: 2016 ident: 10.1016/j.cosrev.2021.100372_b39 article-title: Structural analysis of packing schemes for extracting hidden codes in mobile malware publication-title: EURASIP J. Wireless Commun. Networking doi: 10.1186/s13638-016-0720-3 – volume: 7 start-page: 25 issue: 2 year: 2018 ident: 10.1016/j.cosrev.2021.100372_b33 article-title: The influence of vulnerabilities on the information systems and methods of prevention publication-title: Int. J. Inform. Secur. Cybercrime (IJISC) – start-page: 57 year: 2016 ident: 10.1016/j.cosrev.2021.100372_b26 article-title: Comparing android app permissions – volume: 26 start-page: 891 issue: 3 year: 2018 ident: 10.1016/j.cosrev.2021.100372_b35 article-title: A survey on dynamic mobile malware detection publication-title: Softw. Qual. J. doi: 10.1007/s11219-017-9368-4 – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b1 – start-page: 366 year: 2017 ident: 10.1016/j.cosrev.2021.100372_b25 article-title: Enhancing data security of iOS client by encryption algorithm – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b32 – volume: 9 issue: 3 year: 2015 ident: 10.1016/j.cosrev.2021.100372_b12 article-title: A strengthened Android signature management method publication-title: KSII Trans. Internet Inform. Syst. – volume: 33 start-page: 1 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b30 article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: A survey publication-title: Comp. Sci. Rev. doi: 10.1016/j.cosrev.2019.05.002 – start-page: 270 year: 2013 ident: 10.1016/j.cosrev.2021.100372_b10 article-title: Assessment of malicious applications using permissions and enhanced user interfaces on android – volume: 6 start-page: 3 issue: 3 year: 2015 ident: 10.1016/j.cosrev.2021.100372_b11 article-title: A survey of Android security threats and defenses publication-title: JoWUA – year: 2017 ident: 10.1016/j.cosrev.2021.100372_b17 – volume: 32 start-page: 1 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b34 article-title: A survey on malware analysis and mitigation techniques publication-title: Comp. Sci. Rev. doi: 10.1016/j.cosrev.2019.01.002 – volume: 28 start-page: 1 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b31 article-title: Analysis of software vulnerability classification based on different technical parameters publication-title: Inform. Secur. J.: Glob. Perspect. – start-page: 203 year: 2013 ident: 10.1016/j.cosrev.2021.100372_b14 article-title: Mobile device encryption systems – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b4 – year: 2018 ident: 10.1016/j.cosrev.2021.100372_b6 – start-page: 1 year: 2018 ident: 10.1016/j.cosrev.2021.100372_b27 article-title: Rethinking app permissions on iOS – ident: 10.1016/j.cosrev.2021.100372_b24 doi: 10.1145/3339252.3340340 – volume: 5 start-page: 546 year: 2011 ident: 10.1016/j.cosrev.2021.100372_b15 article-title: Exploration of attacks on current generation smartphones publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2011.07.071 – volume: 97 start-page: 887 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b37 article-title: Mobile malware attacks: Review, taxonomy & future directions publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.03.007 – volume: 22 start-page: 1081 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b42 article-title: Data on vulnerability detection in android publication-title: Data Brief doi: 10.1016/j.dib.2018.12.038 – year: 2017 ident: 10.1016/j.cosrev.2021.100372_b19 – start-page: 443 year: 2012 ident: 10.1016/j.cosrev.2021.100372_b13 article-title: Evaluating the threat of epidemic mobile malware – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b3 – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b20 – volume: 72 start-page: 285 issue: 2 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b8 article-title: Comprehensive review and analysis of anti-malware apps for smartphones publication-title: Telecommun. Syst. doi: 10.1007/s11235-019-00575-7 – start-page: 635 year: 2014 ident: 10.1016/j.cosrev.2021.100372_b18 article-title: Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS – start-page: 89 year: 2018 ident: 10.1016/j.cosrev.2021.100372_b28 article-title: Detecting manipulated smartphone data on Android and iOS devices – start-page: 346 year: 2011 ident: 10.1016/j.cosrev.2021.100372_b21 article-title: Privilege escalation attacks on android – volume: 96 start-page: 4013 issue: 3 year: 2017 ident: 10.1016/j.cosrev.2021.100372_b22 article-title: Comparison of static and dynamic analyzer tools for iOS applications publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-017-4366-1 – volume: 77 start-page: 12 year: 2019 ident: 10.1016/j.cosrev.2021.100372_b41 article-title: A novel parallel classifier scheme for vulnerability detection in android publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2019.04.019 – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b2 – start-page: 234 year: 2016 ident: 10.1016/j.cosrev.2021.100372_b29 article-title: Security evaluation of the smartphone platforms: A case study with Android, iOS and Windows phones publication-title: Asian J. Math. Comput. Res. – ident: 10.1016/j.cosrev.2021.100372_b36 doi: 10.1007/s10207-017-0398-5 – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b40 – volume: 11 start-page: 1 issue: 1 year: 2020 ident: 10.1016/j.cosrev.2021.100372_b38 article-title: A data-driven characterization of modern Android Spyware publication-title: ACM Trans. Manage. Inform. Syst. (TMIS) doi: 10.1145/3382158 – volume: 11 start-page: 3 year: 2014 ident: 10.1016/j.cosrev.2021.100372_b16 article-title: Identifying back doors attack points and surveillance mechanisms in iOS devices publication-title: Digit. Invest. doi: 10.1016/j.diin.2014.01.001 – start-page: 13 year: 2013 ident: 10.1016/j.cosrev.2021.100372_b23 article-title: PSiOS: bring your own privacy & security to iOS devices – start-page: 357 year: 2017 ident: 10.1016/j.cosrev.2021.100372_b5 article-title: Detection of vulnerabilities caused by webview exploitation in smartphone – year: 2020 ident: 10.1016/j.cosrev.2021.100372_b7 |
| SSID | ssj0070056 |
| Score | 2.4775078 |
| SecondaryResourceType | review_article |
| Snippet | Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 100372 |
| SubjectTerms | Android iOS Malware Security Smartphones Vulnerabilities |
| Title | Comparative analysis of Android and iOS from security viewpoint |
| URI | https://dx.doi.org/10.1016/j.cosrev.2021.100372 |
| Volume | 40 |
| WOSCitedRecordID | wos000656789000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1876-7745 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0070056 issn: 1574-0137 databaseCode: AIEXJ dateStart: 20070801 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELbYsoe98F7xlg_cUFBiJ3F8Qqgqr0NZCZB6i2LH1gZVadUWBP-ecW236YJYOHCxLCuZWP6c8Xg8_gahI1gDaKjCGCw3SmGDksaBIFoGiRaRYCWPuC6nySZYt5v1evyPy0w3nqYTYHWdPT_z4bdCDW0Atrk6-wW4Z0KhAeoAOpQAO5SfAr7d4PMuGpQjJnRxUJX2tODm1l4sGbv0dcfmhGA4qOoFV71P-XDsL_-MFk4SLgobGnb7t3qq5i7RfvVivapdqEyqpl-BRPMoPq8KmYlPsZQsXldaaiWn7CJDXkPe1cPWJfAAwzg2qXSM_JP544u01_8sR7MgQR9_9pBbKbmRklspP9AyYQnPWmj57KrTu_aLLzPUplOKXNd5f1tyGtL3tjfvWyMNC-NuDa24rQE-s5CuoyVVb6BVjwF2WngTnTYQxh5hPNDYIQxtJQaEsUEYe4TxDOEtdH_euWtfBi4PRiBhQzcJiBZMxkUmQ610xGMdCtgGE8WpJkXKIp3EIgVDF_6tlGoWp1IKsMNVSWlBYpHQ36hVD2q1jXAZMsUlSUlBkliypBBhoUoTR5wQniVsB1E_Hrl0JPEmV0k__wiNHRTM3hpakpT_PM_8UOduAlsDLof58-Gbu1_80h76NZ_b-6g1GT2qA_RTPk2q8ejQTZ5Xuqt1Ew |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comparative+analysis+of+Android+and+iOS+from+security+viewpoint&rft.jtitle=Computer+science+review&rft.au=Garg%2C+Shivi&rft.au=Baliyan%2C+Niyati&rft.date=2021-05-01&rft.issn=1574-0137&rft.volume=40&rft.spage=100372&rft_id=info:doi/10.1016%2Fj.cosrev.2021.100372&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cosrev_2021_100372 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-0137&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-0137&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-0137&client=summon |