Counter Measuring Conceivable Security Threats on Smart Healthcare Devices
Author(s) -
Syeda Mariam Muzammal,
Munam Ali Shah,
Hasan Ali Khattak,
Sohail Jabbar,
Ghufran Ahmed,
Shehzad Khalid,
Shahid Hussain,
Kijun Han
Publication year - 2018
Publication title -
ieee access
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.587
H-Index - 127
ISSN - 2169-3536
DOI - 10.1109/access.2018.2826225
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
Smart devices, the carriers of a huge amount of private, sensitive and confidential data are pervasive in today's world with innovative and enhanced functionalities. Smartphones have brought tremendous change in people's lives with the launch of a new platform of communication and an ease of access to a wide range of applications. Due to the swift increase in the users of Android smartphones and the increasing demands based on advanced ease and features, developers are working hard to achieve the needful. Easy access to certain features and applications gave rise to the powerfulness and an efficacy of various threats, risks and vulnerabilities that can victimize users' private data residing in smartphone paradigm. With the developments and enhancements in malware, for Android-based smartphones, attacks continue to occur. In this paper, we investigate one of the possibly most destructive attacks for Android, that is, screenshot attack. We have developed “ScreenStealer”application and explored the vulnerabilities which make Android more inclined to risks and threats. Furthermore, we evaluated capture ratio of screenshots, resources consumption and execution time to determine effectiveness, efficiency and stealthiness of such a malicious application.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom