Comparative analysis of Android and iOS from security viewpoint

Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with the computational power to handle a wide array of applications attracts millions of users worldwide, also raises the security concerns on thes...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Computer science review Ročník 40; s. 100372
Hlavní autori: Garg, Shivi, Baliyan, Niyati
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Inc 01.05.2021
Predmet:
ISSN:1574-0137, 1876-7745
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with the computational power to handle a wide array of applications attracts millions of users worldwide, also raises the security concerns on these platforms. This paper presents a comparative analysis between Android and iOS on a wide range of security aspects. It analyzes data for the period 2015-2019 and gives a detailed snapshot of not only the quantum of vulnerabilities, but also their impact. In addition, the paper leverages the well-established security triad i.e. CIA (Confidentiality, Integrity, Availability) to compare both the operating systems. The comprehensive and pragmatic approach taken in the paper makes it easier to infer that Android is more susceptible to security breaches and malware attacks as compared to iOS. Hence, researchers should divert their efforts and focus on finding solutions to problems pertaining to Android. The paper concludes by laying down future research directions and scope of work, which can be leveraged not only by application developers, but also by researchers. This will help make Android safer for users and will further increase its demand as a mobile operating system.
AbstractList Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with the computational power to handle a wide array of applications attracts millions of users worldwide, also raises the security concerns on these platforms. This paper presents a comparative analysis between Android and iOS on a wide range of security aspects. It analyzes data for the period 2015-2019 and gives a detailed snapshot of not only the quantum of vulnerabilities, but also their impact. In addition, the paper leverages the well-established security triad i.e. CIA (Confidentiality, Integrity, Availability) to compare both the operating systems. The comprehensive and pragmatic approach taken in the paper makes it easier to infer that Android is more susceptible to security breaches and malware attacks as compared to iOS. Hence, researchers should divert their efforts and focus on finding solutions to problems pertaining to Android. The paper concludes by laying down future research directions and scope of work, which can be leveraged not only by application developers, but also by researchers. This will help make Android safer for users and will further increase its demand as a mobile operating system.
ArticleNumber 100372
Author Baliyan, Niyati
Garg, Shivi
Author_xml – sequence: 1
  givenname: Shivi
  orcidid: 0000-0002-1698-1005
  surname: Garg
  fullname: Garg, Shivi
  email: shivi002phd16@igdtuw.ac.in
  organization: Faculty of Computer Engineering, J.C. Bose University of Science and Technology, YMCA, Faridabad, India
– sequence: 2
  givenname: Niyati
  orcidid: 0000-0002-2019-5381
  surname: Baliyan
  fullname: Baliyan, Niyati
  email: niyatibaliyan@igdtuw.ac.in
  organization: Information Technology Department, Indira Gandhi Delhi Technical University for Women, Delhi, India
BookMark eNqFkMtKQzEURYNUsFX_wEF-4NaTx01aB0opvqDQgToOuXlASpuU5Frp35tyHTnQ0TlsWBvWnqBRTNEhdENgSoCI283UpJLdYUqBkhoBk_QMjclMikZK3o7q30reAGHyAk1K2QBIgFaM0cMy7fY66z4cHNZRb48lFJw8XkSbU7A1szis37DPaYeLM5859Ed8CO5rn0Lsr9C519virn_uJfp4enxfvjSr9fPrcrFqDAPRN9R30nA9M-CdJ3PuoSOcUzdnnmohiW95J2Zs3kkrmJdcGNNxaJ1lTFPetewS8aHX5FSqq1f7HHY6HxUBdRpBbdQwgjqNoIYRKnb3CzOhr7Ip9lmH7X_w_QC7KlaNsyomuGicDdmZXtkU_i74BhzAfRM
CitedBy_id crossref_primary_10_1016_j_jisa_2024_103741
crossref_primary_10_3390_electronics14142763
crossref_primary_10_1007_s11235_022_00983_2
crossref_primary_10_1016_j_eswa_2021_116360
crossref_primary_10_3390_s23218749
crossref_primary_10_1002_sd_2995
crossref_primary_10_1108_ET_04_2023_0128
crossref_primary_10_1038_s41746_025_01595_1
crossref_primary_10_3390_s25041153
crossref_primary_10_48017_dj_v10i1_3146
crossref_primary_10_3390_electronics10131606
crossref_primary_10_1007_s11416_023_00477_y
crossref_primary_10_1186_s40561_022_00199_6
crossref_primary_10_1007_s10209_025_01221_7
crossref_primary_10_1007_s42044_023_00136_x
crossref_primary_10_3390_info14080457
crossref_primary_10_1145_3556974
crossref_primary_10_1007_s12525_025_00788_6
crossref_primary_10_1145_3617177
crossref_primary_10_3390_technologies11030076
crossref_primary_10_1109_ACCESS_2024_3485706
crossref_primary_10_1016_j_sysarc_2025_103547
crossref_primary_10_1016_j_cosrev_2022_100529
crossref_primary_10_1109_ACCESS_2022_3181605
crossref_primary_10_1111_exsy_13482
crossref_primary_10_1016_j_bjps_2025_06_011
crossref_primary_10_2174_0126662558308040241009061506
crossref_primary_10_3390_app13053061
Cites_doi 10.1109/TIFS.2015.2436364
10.1186/s13638-016-0720-3
10.1007/s11219-017-9368-4
10.1016/j.cosrev.2019.05.002
10.1016/j.cosrev.2019.01.002
10.1145/3339252.3340340
10.1016/j.procs.2011.07.071
10.1016/j.future.2019.03.007
10.1016/j.dib.2018.12.038
10.1007/s11235-019-00575-7
10.1007/s11277-017-4366-1
10.1016/j.compeleceng.2019.04.019
10.1007/s10207-017-0398-5
10.1145/3382158
10.1016/j.diin.2014.01.001
ContentType Journal Article
Copyright 2021 Elsevier Inc.
Copyright_xml – notice: 2021 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.cosrev.2021.100372
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1876-7745
ExternalDocumentID 10_1016_j_cosrev_2021_100372
S1574013721000125
GroupedDBID --K
--M
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABBOA
ABFRF
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADMUD
AEBSH
AEFWE
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
AXJTR
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
HAMUX
HVGLF
HZ~
IHE
J1W
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SES
SPC
SPCBC
SSB
SSD
SSV
SSZ
T5K
UNMZH
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-2fb7c4a8c0fef194f0b1442e93f2a671f54b6839b7d63f746ccb405ed33a24b53
ISICitedReferencesCount 50
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000656789000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1574-0137
IngestDate Sat Nov 29 07:03:52 EST 2025
Tue Nov 18 22:17:18 EST 2025
Fri Feb 23 02:40:57 EST 2024
IsPeerReviewed false
IsScholarly true
Keywords Smartphones
Malware
iOS
Security
Vulnerabilities
Android
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-2fb7c4a8c0fef194f0b1442e93f2a671f54b6839b7d63f746ccb405ed33a24b53
ORCID 0000-0002-2019-5381
0000-0002-1698-1005
ParticipantIDs crossref_primary_10_1016_j_cosrev_2021_100372
crossref_citationtrail_10_1016_j_cosrev_2021_100372
elsevier_sciencedirect_doi_10_1016_j_cosrev_2021_100372
PublicationCentury 2000
PublicationDate May 2021
2021-05-00
PublicationDateYYYYMMDD 2021-05-01
PublicationDate_xml – month: 05
  year: 2021
  text: May 2021
PublicationDecade 2020
PublicationTitle Computer science review
PublicationYear 2021
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Tung (b3) 2020
Shen, Wang (b25) 2017
Pieterse, Olivier, van Heerden (b28) 2018
Clement (b4) 2020
Diaz (b20) 2020
Zhang (b6) 2018
Shrestha, Ma, Zhu, Li, Saxena (b9) 2015; 10
Popescu (b33) 2018; 7
Grønli, Hansen, Ghinea, Younas (b18) 2014
Lutaaya (b27) 2018
Pierazzi, Mezzour, Han, Colajanni, Subrahmanian (b38) 2020; 11
Ahvanooey, Li, Rabbani, Rajput (b7) 2020
Hidhaya, Geetha (b5) 2017
Teufl, Zefferer, Stromberger (b14) 2013
Clement (b40) 2020
Talal, Zaidan, Zaidan, Albahri, Alsalem, Albahri, Alaa (b8) 2019; 72
Szongott, Henne, Smith (b13) 2012
Loftus, Baumann, van Galen, de Vries (b19) 2017
Kumar, Goyal (b30) 2019; 33
Lim, Yi (b39) 2016; 1
Bhatt, Gupta (b22) 2017; 96
Werthmann, Hund, Davi, Sadeghi, Holz (b23) 2013
Garg, Singh, Mohapatra (b31) 2019; 28
Davi, Dmitrienko, Sadeghi, Winandy (b21) 2011
MacDuffie, Morreale (b26) 2016
Opoku, Davis, Nimbe (b29) 2016
A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6) pp. 719–738.
Qamar, Karim, Chang (b37) 2019; 97
(b2) 2020
Garg, Baliyan (b43) 2021
Zdziarski (b16) 2014; 11
Cho, Seo (b12) 2015; 9
Garg, Baliyan (b41) 2019; 77
O’Dea (b1) 2020
Yan, Yan (b35) 2018; 26
Chakkaravarthy, Sangeetha, Vaidehi (b34) 2019; 32
Garg, Baliyan (b42) 2019; 22
Rashidi, Fung (b11) 2015; 6
Salerno, Sanzgiri, Upadhyaya (b15) 2011; 5
T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryption: Information leakage through unencrypted metadata, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1–7.
Wang (b17) 2017
(b32) 2020
Lee, Ju (b10) 2013
Chakkaravarthy (10.1016/j.cosrev.2021.100372_b34) 2019; 32
Shrestha (10.1016/j.cosrev.2021.100372_b9) 2015; 10
Qamar (10.1016/j.cosrev.2021.100372_b37) 2019; 97
Davi (10.1016/j.cosrev.2021.100372_b21) 2011
Garg (10.1016/j.cosrev.2021.100372_b43) 2021
Loftus (10.1016/j.cosrev.2021.100372_b19) 2017
Bhatt (10.1016/j.cosrev.2021.100372_b22) 2017; 96
Zdziarski (10.1016/j.cosrev.2021.100372_b16) 2014; 11
Werthmann (10.1016/j.cosrev.2021.100372_b23) 2013
Kumar (10.1016/j.cosrev.2021.100372_b30) 2019; 33
Hidhaya (10.1016/j.cosrev.2021.100372_b5) 2017
Garg (10.1016/j.cosrev.2021.100372_b31) 2019; 28
Garg (10.1016/j.cosrev.2021.100372_b42) 2019; 22
Shen (10.1016/j.cosrev.2021.100372_b25) 2017
Lim (10.1016/j.cosrev.2021.100372_b39) 2016; 1
Tung (10.1016/j.cosrev.2021.100372_b3) 2020
Salerno (10.1016/j.cosrev.2021.100372_b15) 2011; 5
10.1016/j.cosrev.2021.100372_b24
Zhang (10.1016/j.cosrev.2021.100372_b6) 2018
Rashidi (10.1016/j.cosrev.2021.100372_b11) 2015; 6
Szongott (10.1016/j.cosrev.2021.100372_b13) 2012
Garg (10.1016/j.cosrev.2021.100372_b41) 2019; 77
Pierazzi (10.1016/j.cosrev.2021.100372_b38) 2020; 11
Clement (10.1016/j.cosrev.2021.100372_b40) 2020
Lee (10.1016/j.cosrev.2021.100372_b10) 2013
Teufl (10.1016/j.cosrev.2021.100372_b14) 2013
(10.1016/j.cosrev.2021.100372_b32) 2020
Lutaaya (10.1016/j.cosrev.2021.100372_b27) 2018
O’Dea (10.1016/j.cosrev.2021.100372_b1) 2020
Cho (10.1016/j.cosrev.2021.100372_b12) 2015; 9
Talal (10.1016/j.cosrev.2021.100372_b8) 2019; 72
Grønli (10.1016/j.cosrev.2021.100372_b18) 2014
Ahvanooey (10.1016/j.cosrev.2021.100372_b7) 2020
Yan (10.1016/j.cosrev.2021.100372_b35) 2018; 26
MacDuffie (10.1016/j.cosrev.2021.100372_b26) 2016
Popescu (10.1016/j.cosrev.2021.100372_b33) 2018; 7
Diaz (10.1016/j.cosrev.2021.100372_b20) 2020
Pieterse (10.1016/j.cosrev.2021.100372_b28) 2018
Opoku (10.1016/j.cosrev.2021.100372_b29) 2016
Clement (10.1016/j.cosrev.2021.100372_b4) 2020
(10.1016/j.cosrev.2021.100372_b2) 2020
Wang (10.1016/j.cosrev.2021.100372_b17) 2017
10.1016/j.cosrev.2021.100372_b36
References_xml – year: 2020
  ident: b3
  article-title: Bigger than Windows, bigger than iOS: Google now has 2.5 billion active Android devices
– start-page: 234
  year: 2016
  end-page: 259
  ident: b29
  article-title: Security evaluation of the smartphone platforms: A case study with Android, iOS and Windows phones
  publication-title: Asian J. Math. Comput. Res.
– volume: 22
  start-page: 1081
  year: 2019
  end-page: 1087
  ident: b42
  article-title: Data on vulnerability detection in android
  publication-title: Data Brief
– volume: 1
  start-page: 221
  year: 2016
  ident: b39
  article-title: Structural analysis of packing schemes for extracting hidden codes in mobile malware
  publication-title: EURASIP J. Wireless Commun. Networking
– start-page: 13
  year: 2013
  end-page: 24
  ident: b23
  article-title: PSiOS: bring your own privacy & security to iOS devices
  publication-title: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
– year: 2020
  ident: b7
  article-title: A survey on smartphones security: Software vulnerabilities, malware, and attacks
– volume: 6
  start-page: 3
  year: 2015
  end-page: 35
  ident: b11
  article-title: A survey of Android security threats and defenses
  publication-title: JoWUA
– volume: 11
  start-page: 3
  year: 2014
  end-page: 19
  ident: b16
  article-title: Identifying back doors attack points and surveillance mechanisms in iOS devices
  publication-title: Digit. Invest.
– volume: 11
  start-page: 1
  year: 2020
  end-page: 38
  ident: b38
  article-title: A data-driven characterization of modern Android Spyware
  publication-title: ACM Trans. Manage. Inform. Syst. (TMIS)
– volume: 77
  start-page: 12
  year: 2019
  end-page: 26
  ident: b41
  article-title: A novel parallel classifier scheme for vulnerability detection in android
  publication-title: Comput. Electr. Eng.
– start-page: 635
  year: 2014
  end-page: 641
  ident: b18
  article-title: Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS
  publication-title: IEEE 28th International Conference on Advanced Information Networking and Applications
– volume: 33
  start-page: 1
  year: 2019
  end-page: 48
  ident: b30
  article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
  publication-title: Comp. Sci. Rev.
– start-page: 203
  year: 2013
  end-page: 216
  ident: b14
  article-title: Mobile device encryption systems
  publication-title: IFIP International Information Security Conference
– year: 2020
  ident: b20
  article-title: IOS security - iOS 11
– start-page: 357
  year: 2017
  end-page: 364
  ident: b5
  article-title: Detection of vulnerabilities caused by webview exploitation in smartphone
  publication-title: Ninth International Conference on Advanced Computing (ICoAC)
– reference: T. Groß, M. Ahmadova, T. Müller, Analyzing Android’s file-based encryption: Information leakage through unencrypted metadata, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1–7.
– volume: 96
  start-page: 4013
  year: 2017
  end-page: 4046
  ident: b22
  article-title: Comparison of static and dynamic analyzer tools for iOS applications
  publication-title: Wirel. Pers. Commun.
– start-page: 1
  year: 2018
  end-page: 6
  ident: b27
  article-title: Rethinking app permissions on iOS
  publication-title: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems
– volume: 28
  start-page: 1
  year: 2019
  end-page: 19
  ident: b31
  article-title: Analysis of software vulnerability classification based on different technical parameters
  publication-title: Inform. Secur. J.: Glob. Perspect.
– start-page: 346
  year: 2011
  end-page: 360
  ident: b21
  article-title: Privilege escalation attacks on android
  publication-title: Information Security
– volume: 7
  start-page: 25
  year: 2018
  end-page: 32
  ident: b33
  article-title: The influence of vulnerabilities on the information systems and methods of prevention
  publication-title: Int. J. Inform. Secur. Cybercrime (IJISC)
– year: 2020
  ident: b40
  article-title: Development of new Android malware worldwide from 2016 to 2019 (in millions)
– volume: 10
  start-page: 2270
  year: 2015
  end-page: 2283
  ident: b9
  article-title: Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware
  publication-title: IEEE Trans. Inf. Forensics Secur.
– start-page: 89
  year: 2018
  end-page: 103
  ident: b28
  article-title: Detecting manipulated smartphone data on Android and iOS devices
  publication-title: International Information Security Conference
– start-page: 57
  year: 2016
  end-page: 64
  ident: b26
  article-title: Comparing android app permissions
  publication-title: International Conference of Design, User Experience, and Usability
– year: 2020
  ident: b32
  article-title: CVE details
– year: 2020
  ident: b4
  article-title: Mobile app downloads worldwide from 2018 to 2024, by store
– year: 2021
  ident: b43
  article-title: Android malware classification using ensemble classifiers
  publication-title: Cloud Security: Concepts, Applications and Perspectives, Chapter 13
– year: 2018
  ident: b6
  article-title: Smartphone App Security: Vulnerabilities and Implementations
– start-page: 270
  year: 2013
  ident: b10
  article-title: Assessment of malicious applications using permissions and enhanced user interfaces on android
  publication-title: IEEE International Conference on Intelligence and Security Informatics (ISI)
– start-page: 443
  year: 2012
  end-page: 450
  ident: b13
  article-title: Evaluating the threat of epidemic mobile malware
  publication-title: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
– volume: 9
  year: 2015
  ident: b12
  article-title: A strengthened Android signature management method
  publication-title: KSII Trans. Internet Inform. Syst.
– reference: A. Cimitile, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Talos: no more ransomware victims with formal methods, Int. J. Inform. Secur., 17(6) pp. 719–738.
– volume: 97
  start-page: 887
  year: 2019
  end-page: 909
  ident: b37
  article-title: Mobile malware attacks: Review, taxonomy & future directions
  publication-title: Future Gener. Comput. Syst.
– year: 2017
  ident: b19
  article-title: Android 7 file based encryption and the attacks against it
– year: 2020
  ident: b1
  article-title: Number of mobile phone users worldwide from 2016 to 2021 (in billions)
– volume: 72
  start-page: 285
  year: 2019
  end-page: 337
  ident: b8
  article-title: Comprehensive review and analysis of anti-malware apps for smartphones
  publication-title: Telecommun. Syst.
– volume: 5
  start-page: 546
  year: 2011
  end-page: 553
  ident: b15
  article-title: Exploration of attacks on current generation smartphones
  publication-title: Procedia Comput. Sci.
– start-page: 366
  year: 2017
  end-page: 370
  ident: b25
  article-title: Enhancing data security of iOS client by encryption algorithm
  publication-title: IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
– year: 2017
  ident: b17
  article-title: Introduction to Computing Applications in Forestry and Natural Resource Management
– volume: 26
  start-page: 891
  year: 2018
  end-page: 919
  ident: b35
  article-title: A survey on dynamic mobile malware detection
  publication-title: Softw. Qual. J.
– year: 2020
  ident: b2
  article-title: Mobile operating system market share worldwide
– volume: 32
  start-page: 1
  year: 2019
  end-page: 23
  ident: b34
  article-title: A survey on malware analysis and mitigation techniques
  publication-title: Comp. Sci. Rev.
– year: 2021
  ident: 10.1016/j.cosrev.2021.100372_b43
  article-title: Android malware classification using ensemble classifiers
– volume: 10
  start-page: 2270
  year: 2015
  ident: 10.1016/j.cosrev.2021.100372_b9
  article-title: Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2436364
– volume: 1
  start-page: 221
  year: 2016
  ident: 10.1016/j.cosrev.2021.100372_b39
  article-title: Structural analysis of packing schemes for extracting hidden codes in mobile malware
  publication-title: EURASIP J. Wireless Commun. Networking
  doi: 10.1186/s13638-016-0720-3
– volume: 7
  start-page: 25
  issue: 2
  year: 2018
  ident: 10.1016/j.cosrev.2021.100372_b33
  article-title: The influence of vulnerabilities on the information systems and methods of prevention
  publication-title: Int. J. Inform. Secur. Cybercrime (IJISC)
– start-page: 57
  year: 2016
  ident: 10.1016/j.cosrev.2021.100372_b26
  article-title: Comparing android app permissions
– volume: 26
  start-page: 891
  issue: 3
  year: 2018
  ident: 10.1016/j.cosrev.2021.100372_b35
  article-title: A survey on dynamic mobile malware detection
  publication-title: Softw. Qual. J.
  doi: 10.1007/s11219-017-9368-4
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b1
– start-page: 366
  year: 2017
  ident: 10.1016/j.cosrev.2021.100372_b25
  article-title: Enhancing data security of iOS client by encryption algorithm
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b32
– volume: 9
  issue: 3
  year: 2015
  ident: 10.1016/j.cosrev.2021.100372_b12
  article-title: A strengthened Android signature management method
  publication-title: KSII Trans. Internet Inform. Syst.
– volume: 33
  start-page: 1
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b30
  article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
  publication-title: Comp. Sci. Rev.
  doi: 10.1016/j.cosrev.2019.05.002
– start-page: 270
  year: 2013
  ident: 10.1016/j.cosrev.2021.100372_b10
  article-title: Assessment of malicious applications using permissions and enhanced user interfaces on android
– volume: 6
  start-page: 3
  issue: 3
  year: 2015
  ident: 10.1016/j.cosrev.2021.100372_b11
  article-title: A survey of Android security threats and defenses
  publication-title: JoWUA
– year: 2017
  ident: 10.1016/j.cosrev.2021.100372_b17
– volume: 32
  start-page: 1
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b34
  article-title: A survey on malware analysis and mitigation techniques
  publication-title: Comp. Sci. Rev.
  doi: 10.1016/j.cosrev.2019.01.002
– volume: 28
  start-page: 1
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b31
  article-title: Analysis of software vulnerability classification based on different technical parameters
  publication-title: Inform. Secur. J.: Glob. Perspect.
– start-page: 203
  year: 2013
  ident: 10.1016/j.cosrev.2021.100372_b14
  article-title: Mobile device encryption systems
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b4
– year: 2018
  ident: 10.1016/j.cosrev.2021.100372_b6
– start-page: 1
  year: 2018
  ident: 10.1016/j.cosrev.2021.100372_b27
  article-title: Rethinking app permissions on iOS
– ident: 10.1016/j.cosrev.2021.100372_b24
  doi: 10.1145/3339252.3340340
– volume: 5
  start-page: 546
  year: 2011
  ident: 10.1016/j.cosrev.2021.100372_b15
  article-title: Exploration of attacks on current generation smartphones
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2011.07.071
– volume: 97
  start-page: 887
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b37
  article-title: Mobile malware attacks: Review, taxonomy & future directions
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.03.007
– volume: 22
  start-page: 1081
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b42
  article-title: Data on vulnerability detection in android
  publication-title: Data Brief
  doi: 10.1016/j.dib.2018.12.038
– year: 2017
  ident: 10.1016/j.cosrev.2021.100372_b19
– start-page: 443
  year: 2012
  ident: 10.1016/j.cosrev.2021.100372_b13
  article-title: Evaluating the threat of epidemic mobile malware
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b3
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b20
– volume: 72
  start-page: 285
  issue: 2
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b8
  article-title: Comprehensive review and analysis of anti-malware apps for smartphones
  publication-title: Telecommun. Syst.
  doi: 10.1007/s11235-019-00575-7
– start-page: 635
  year: 2014
  ident: 10.1016/j.cosrev.2021.100372_b18
  article-title: Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS
– start-page: 89
  year: 2018
  ident: 10.1016/j.cosrev.2021.100372_b28
  article-title: Detecting manipulated smartphone data on Android and iOS devices
– start-page: 346
  year: 2011
  ident: 10.1016/j.cosrev.2021.100372_b21
  article-title: Privilege escalation attacks on android
– volume: 96
  start-page: 4013
  issue: 3
  year: 2017
  ident: 10.1016/j.cosrev.2021.100372_b22
  article-title: Comparison of static and dynamic analyzer tools for iOS applications
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-017-4366-1
– volume: 77
  start-page: 12
  year: 2019
  ident: 10.1016/j.cosrev.2021.100372_b41
  article-title: A novel parallel classifier scheme for vulnerability detection in android
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2019.04.019
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b2
– start-page: 234
  year: 2016
  ident: 10.1016/j.cosrev.2021.100372_b29
  article-title: Security evaluation of the smartphone platforms: A case study with Android, iOS and Windows phones
  publication-title: Asian J. Math. Comput. Res.
– ident: 10.1016/j.cosrev.2021.100372_b36
  doi: 10.1007/s10207-017-0398-5
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b40
– volume: 11
  start-page: 1
  issue: 1
  year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b38
  article-title: A data-driven characterization of modern Android Spyware
  publication-title: ACM Trans. Manage. Inform. Syst. (TMIS)
  doi: 10.1145/3382158
– volume: 11
  start-page: 3
  year: 2014
  ident: 10.1016/j.cosrev.2021.100372_b16
  article-title: Identifying back doors attack points and surveillance mechanisms in iOS devices
  publication-title: Digit. Invest.
  doi: 10.1016/j.diin.2014.01.001
– start-page: 13
  year: 2013
  ident: 10.1016/j.cosrev.2021.100372_b23
  article-title: PSiOS: bring your own privacy & security to iOS devices
– start-page: 357
  year: 2017
  ident: 10.1016/j.cosrev.2021.100372_b5
  article-title: Detection of vulnerabilities caused by webview exploitation in smartphone
– year: 2020
  ident: 10.1016/j.cosrev.2021.100372_b7
SSID ssj0070056
Score 2.4775078
SecondaryResourceType review_article
Snippet Smartphone usage has increased exponentially in the recent years. Android and iOS are the most popular smartphone platforms, while the ease of use along with...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 100372
SubjectTerms Android
iOS
Malware
Security
Smartphones
Vulnerabilities
Title Comparative analysis of Android and iOS from security viewpoint
URI https://dx.doi.org/10.1016/j.cosrev.2021.100372
Volume 40
WOSCitedRecordID wos000656789000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1876-7745
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0070056
  issn: 1574-0137
  databaseCode: AIEXJ
  dateStart: 20070801
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELbYsoe98F7xlg_cUFBiJ3F8Qqgqr0NZCZB6i2LH1gZVadUWBP-ecW236YJYOHCxLCuZWP6c8Xg8_gahI1gDaKjCGCw3SmGDksaBIFoGiRaRYCWPuC6nySZYt5v1evyPy0w3nqYTYHWdPT_z4bdCDW0Atrk6-wW4Z0KhAeoAOpQAO5SfAr7d4PMuGpQjJnRxUJX2tODm1l4sGbv0dcfmhGA4qOoFV71P-XDsL_-MFk4SLgobGnb7t3qq5i7RfvVivapdqEyqpl-BRPMoPq8KmYlPsZQsXldaaiWn7CJDXkPe1cPWJfAAwzg2qXSM_JP544u01_8sR7MgQR9_9pBbKbmRklspP9AyYQnPWmj57KrTu_aLLzPUplOKXNd5f1tyGtL3tjfvWyMNC-NuDa24rQE-s5CuoyVVb6BVjwF2WngTnTYQxh5hPNDYIQxtJQaEsUEYe4TxDOEtdH_euWtfBi4PRiBhQzcJiBZMxkUmQ610xGMdCtgGE8WpJkXKIp3EIgVDF_6tlGoWp1IKsMNVSWlBYpHQ36hVD2q1jXAZMsUlSUlBkliypBBhoUoTR5wQniVsB1E_Hrl0JPEmV0k__wiNHRTM3hpakpT_PM_8UOduAlsDLof58-Gbu1_80h76NZ_b-6g1GT2qA_RTPk2q8ejQTZ5Xuqt1Ew
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comparative+analysis+of+Android+and+iOS+from+security+viewpoint&rft.jtitle=Computer+science+review&rft.au=Garg%2C+Shivi&rft.au=Baliyan%2C+Niyati&rft.date=2021-05-01&rft.issn=1574-0137&rft.volume=40&rft.spage=100372&rft_id=info:doi/10.1016%2Fj.cosrev.2021.100372&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cosrev_2021_100372
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-0137&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-0137&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-0137&client=summon