CO4820 - Ass1B: Literature Review and Search Terms for Mobile Security

Verified

Added on  2023/05/30

|3
|568
|251
Report
AI Summary
This assignment, part of the CO4820 module, focuses on a literature review concerning mobile application security. The student provides an annotated list of five search terms, each accompanied by summaries of relevant papers. The papers explore various aspects of mobile security, including emerging vulnerabilities, malware threats, security platforms, user awareness, and cross-platform development. The assignment aims to help students understand and critique academic literature within the computing/computer science field. The student also indicates which papers are intended for inclusion in the final literature review. This work is submitted through Turnitin and forms a part of the assessment criteria for the module, contributing to the learning outcomes related to sourcing, reading, critiquing, and constructing a well-referenced literature review. The topic of the literature review is mobile application security and is agreed upon with the module tutor.
Document Page
CO4820 – Ass1B
Annotated List of Five Search Terms
Record here the first five search terms, and for each one – one or two papers looked at -
that you use for your topic. NOTE that just because you FIND a paper here it does NOT have
to end up being in your review. Indicate those papers that find their way into your review
with a Y in the right-hand column. EXPAND this table if you like.
TOPIC………………………………………………………………………………………………………………………………
Mobile application and security
SEARCH 1 - Search term used…………………………………………………………………………………….
Title of paper Main points from this paper (Less than 50 words) USED
Y/N
A survey on
security for
mobile
devices
In this paper author describes the number of emerging
vulnerabilities. This paper surveys the state of the art on threats,
vulnerabilities and security solutions over the period 2004-2011,
by focusing on high-level attacks, such those to user
applications.
Mobile
Security: A
Look Ahead
The authors provide an overview of the current threats based on
data collected from observing the interaction of 75 million users
with the Internet. Extrapolating this data gives an insight into
what threats wait on the horizon.
Mobile application Security Threats measurements
SEARCH 2 - Search term used…………………………………………………………………………………….
Title of paper Main points from this paper (Less than 50 words) USED
Y/N
Mobile
application
security:
malware
threats and
defences
It reviews the existing malware prevention and detection
techniques.
Mobile-
sandbox:
having a
deeper look
into android
applications
In this paper, they present Mobile-Sandbox, a system designed
to automatically analyse Android applications in two novel way.
Mobile application security platforms
SEARCH 3 - Search term used…………………………………………………………………………………….
Title of paper Main points from this paper (Less than 50 words) USED
Y/N
Delegate the In this paper, they mount a survey to explore the security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
smartphone
user? Security
awareness in
smartphone
platforms
awareness of smartphone users who download applications
from official application repositories.
Mobile
Security: A
Literature
Review
this literature review is focused primarily
on the Android OS security vulnerabilities.
Mobile Platform model Threats
SEARCH 4 - Search term used…………………………………………………………………………………….
Title of paper Main points from this paper (Less than 50 words) USED
Y/N
A comparative
analysis of
cross-platform
development
approaches
for mobile
applications
The paper focuses on the current trends in developing cross-
platform mobile apps.
Balancing
platform
control and
external
contribution in
third party
development:
the boundary
resources
model
This paper proposes a theoretical model that centres on two
drivers behind boundary resources design and use – resourcing
and securing – and how these drivers interact in third party
development.
Mobile Application
SEARCH 5 - Search term used…………………………………………………………………………………….
Title of paper Main points from this paper (Less than 50 words) USED
Y/N
Estimating
mobile
application
energy
consumption
using program
analysis
This paper proposes a new approach that is both lightweight in
terms of its developer requirements and provides fine-grained
estimates of energy consumption at the code level.
Systems and
methods for
mobile
application
In particular, the present invention includes a method, a mobile
device, and a distributed security system (e.g., a “cloud”) that is
utilized to enforce security on mobile devices communicatively
coupled to external networks.
Document Page
security
classification
and
enforcement
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]