{"title":"TO THE ISSUE OF PUBLICLY AVAILABLE NATIONAL DATABASES CONTAINING DESCRIPTIONS OF VULNERABILITIES FOR MOBILE DEVICE OPERATING SYSTEMS","authors":"Stoyan Mechev","doi":"10.53656/math2023-1-7-tot","DOIUrl":null,"url":null,"abstract":"The paper aims to examine publicly available vulnerability databases and their systems for assessing the severity of damage that can be caused by malware targeting mobile devices running Android or iOS. The second goal of the study is to evaluate the vulnerability detection capabilities associated with a specific version of a mobile operating system. Methods used: comparative analysis and summary. Based on the results of the application of the comparative analysis, it is established which of the national databases have better capabilities to filter the data and obtain adequate results when searching for vulnerabilities for mobile devices.","PeriodicalId":41818,"journal":{"name":"Mathematics and Informatics","volume":"3 1","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematics and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53656/math2023-1-7-tot","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"EDUCATION & EDUCATIONAL RESEARCH","Score":null,"Total":0}
引用次数: 0
Abstract
The paper aims to examine publicly available vulnerability databases and their systems for assessing the severity of damage that can be caused by malware targeting mobile devices running Android or iOS. The second goal of the study is to evaluate the vulnerability detection capabilities associated with a specific version of a mobile operating system. Methods used: comparative analysis and summary. Based on the results of the application of the comparative analysis, it is established which of the national databases have better capabilities to filter the data and obtain adequate results when searching for vulnerabilities for mobile devices.