Threats and Vulnerabilities of BYOD and Android

Sandip Yadav, Udyan Ganguly, Saurav Suman, Dr Priti Puri

Abstract


This paper discusses about the vulnerabilities related to Bring-Your-Own- Device (BYOD) wherein we have explored the concept of containerization and the vulnerability related to BYOD Container. Some mitigation process has also been suggested for this vulnerability. The Second vulnerability - what we have tried to highlight is- the vulnerability arising as the Application Installation Permission cannot be cancelled at the runtime. One solution for this vulnerability dealt in the literature is Context-related access control. Paper has discussed some limitation to that solution also and proposed the solution for the same. We have limited the discussion to Mobile usage of BYOD wherein we have taken Android phones as the base.

Keywords


Control Objective; Android Container; Context relate access control

Full Text:

PDF




Copyright (c) 2015 Sandip Yadav, Udyan Ganguly, Saurav Suman, Dr Priti Puri

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org