{"title":"Android操作系统漏洞分类","authors":"K. A. Cherepanov","doi":"10.32460/ISHMU-2020-8-0019","DOIUrl":null,"url":null,"abstract":"The paper identifies the problem of protection of information systems, which have in their structure devices running the Android operating system. A mechanism is proposed for translation foreign experience to conditions specific for the regulatory and organizational methods used in the Russian Federation. The mechanism creates the interactive map of vulnerabilities of the Android OS. The CVE records were grouped according to the Android OS levels. As a result, the need of further research was defined for identifying factors affecting the number of the Android OS vulnerabilities of a specific level. A structure of record has been formed that can be used to build the interactive vulnerability map of the Android OS.","PeriodicalId":154439,"journal":{"name":"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Classification of vulnerabilities of the Android OS\",\"authors\":\"K. A. Cherepanov\",\"doi\":\"10.32460/ISHMU-2020-8-0019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper identifies the problem of protection of information systems, which have in their structure devices running the Android operating system. A mechanism is proposed for translation foreign experience to conditions specific for the regulatory and organizational methods used in the Russian Federation. The mechanism creates the interactive map of vulnerabilities of the Android OS. The CVE records were grouped according to the Android OS levels. As a result, the need of further research was defined for identifying factors affecting the number of the Android OS vulnerabilities of a specific level. A structure of record has been formed that can be used to build the interactive vulnerability map of the Android OS.\",\"PeriodicalId\":154439,\"journal\":{\"name\":\"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32460/ISHMU-2020-8-0019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"VIII Information school of a young scientist Central Scientific Library of the Urals Branch of the Russian Academy of Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32460/ISHMU-2020-8-0019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Classification of vulnerabilities of the Android OS
The paper identifies the problem of protection of information systems, which have in their structure devices running the Android operating system. A mechanism is proposed for translation foreign experience to conditions specific for the regulatory and organizational methods used in the Russian Federation. The mechanism creates the interactive map of vulnerabilities of the Android OS. The CVE records were grouped according to the Android OS levels. As a result, the need of further research was defined for identifying factors affecting the number of the Android OS vulnerabilities of a specific level. A structure of record has been formed that can be used to build the interactive vulnerability map of the Android OS.