hrcak mascot   Srce   HID

Technical gazette, Vol. 25 No. 6, 2018

Review article
https://doi.org/10.17559/TV-20170627175835

Vulnerability Analysis of Smart Phone and Tablet Operating Systems

Aysun Coşkun ; Gazi University, Faculty of Technology, Department of Computer Engineering, Teknikokullar - 06500- Ankara, Turkey
Ümit Bostanci ; Gazi University, Informatics Institute, Department of Computer Forensics, Tunus Cad. No: 35 Kavaklıdere, Çankaya/Ankara, Turkey

Fulltext: english, pdf (868 KB) pages 1860-1866 downloads: 33* cite
APA 6th Edition
Coşkun, A. & Bostanci, Ü. (2018). Vulnerability Analysis of Smart Phone and Tablet Operating Systems. Tehnički vjesnik, 25 (6), 1860-1866. https://doi.org/10.17559/TV-20170627175835
MLA 8th Edition
Coşkun, Aysun and Ümit Bostanci. "Vulnerability Analysis of Smart Phone and Tablet Operating Systems." Tehnički vjesnik, vol. 25, no. 6, 2018, pp. 1860-1866. https://doi.org/10.17559/TV-20170627175835. Accessed 19 Feb. 2019.
Chicago 17th Edition
Coşkun, Aysun and Ümit Bostanci. "Vulnerability Analysis of Smart Phone and Tablet Operating Systems." Tehnički vjesnik 25, no. 6 (2018): 1860-1866. https://doi.org/10.17559/TV-20170627175835
Harvard
Coşkun, A., and Bostanci, Ü. (2018). 'Vulnerability Analysis of Smart Phone and Tablet Operating Systems', Tehnički vjesnik, 25(6), pp. 1860-1866. doi: https://doi.org/10.17559/TV-20170627175835
Vancouver
Coşkun A, Bostanci Ü. Vulnerability Analysis of Smart Phone and Tablet Operating Systems. Tehnički vjesnik [Internet]. 2018 [cited 2019 February 19];25(6):1860-1866. doi: https://doi.org/10.17559/TV-20170627175835
IEEE
A. Coşkun and Ü. Bostanci, "Vulnerability Analysis of Smart Phone and Tablet Operating Systems", Tehnički vjesnik, vol.25, no. 6, pp. 1860-1866, 2018. [Online]. doi: https://doi.org/10.17559/TV-20170627175835

Abstracts
New features are being added into mobile devices such as smart phones and tablets every day. Previously, people only used the phone for voice communication, but nowadays it allows almost any kind of internet operations even when travelling from one place to another. Smart phones and tablets are known to perform these operations through operating systems and application programs. Vulnerabilities may exist in the operating system or application software that allow these devices to be exploited by malicious users or hackers, by copying or deleting all of the data contained on them. For this reason, remediating the security vulnerabilities on operating systems is extremely important. In this study, a new database was created by querying security vulnerabilities of the most preferred operating systems on smart phones and tablets from National Vulnerability Database of the US and CVEDETAILS. With regard to vulnerabilities, CVSS scoring system, created by FIRST and used for scoring them, was examined in the light of re-scoring them. The analysis of security of the operating systems was done with quantitative methods. Eventually, it is aimed to conduct vulnerability analysis of smart phone and tablet operating systems.

Keywords
information security; operating systems; smart devices; tablet computers; vulnerability; zero-day vulnerability

Hrčak ID: 212844

URI
https://hrcak.srce.hr/212844

Visits: 65 *