International Journal of Innovative Research in Engineering and Management
Year: 2014, Volume: 2, Issue: 5
First page : ( 42) Last page : ( 47)
Online ISSN : 2350-0557.
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Aparna Bhonde , Madhumita Chatterjee
Android Operating System, by Open Handset Alliance, prominently led by Google is dominating the share of smart phones. Mobile applications like banking, e-shopping, business apps used on these devices have become foundational tool for today’s workforce. However the Smartphone users are under continuous threat of exposure and misuse of their personal information due to rapid growth of malware for android which significantly exceeds that of other platforms. Android being open platform supports the development of applications. Now a day’s one can publish an app after registration as a developer for USD25. Due to its availability to all android users, the android market is the main channel of malware distribution. Along with its growth, the importance of security has also risen. A proportional increase in the number of vulnerabilities is also happening to the extent that there are limited numbers of security applications available to protect these devices. Among the security apps many antivirus which work on the application layer are present in the market which claims the security. However, the efficacies of these applications have not been empirically established. After studying the shortcomings and demerits of the available solutions, an enhanced security solution for android application assessment at the operating system level is suggested. The solution customizes the android operating system mainly the package manager which holds the notification of the activities which takes place on the device. The package manager is updated to receive the intent passed by the verification agent activity. An application is built which is hooked to the package manager which checks across the database signatures for the malwares and blocks the installation process of the android application on the system. Altogether a new android system image is compiled and tested across the known set of malwares. Unlike antivirus, this check takes place before the process of installation due to which, we are able to mitigate attacks caused by malwares on android smart phones by variety of applications.
[1] Fraunhofer AISEC, Android OS Security: Risks and Limitations, A Practical Evaluation Version 1.0, by: Rafael Fedler, Christian Banse, Christoph Kraub and Volker Fusenig.
[2] University of California ,Berkeley, Android Permissions Demystied, by: CCS11, October 1721, 2011, Chicago, Illionois USA Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner apf, emc, sch, dawnsong, daw@ cs.berkeley.edu
[3] Package Manager In Depth, In Depth: Android Package Manager and Package installer, http://java.dzone.com/articles/depth-android-package-manager
[4] Mobile Security, Identifying the Mobile Security Stack, http://blog.veracode.com/2011/03/identifying-the-mobile-security-stack/
[5] Reference Architecture, Mobile Security Reference Architecture, by CIO Council and US Department of HomeLAnd Security May 2013, https://cio.gov/wpcontent/uploads/2013/05/Mobile-SecurityReference-Architecture.pdf
[6] 2013 IEEE, An AntiVirus API for Android Malware Recognition, by Rafael Fedler, Marcel Kulicke and Julian AISEC Garching near Munich, Germany rafel,kuliche.schuette@aisec.fraunhofer.de http://ieeexplore.ieee.org(PISNumber3A6703677)
[7] Review August 2013, AV-Comparatives Mobile Security, http://www.av-comparatives.org/wp-content/uploads/2013/08/avc_mob_ 201308_en.pdf
[8] Permission, Android Development Guide, http://developer.android.com/guide/topics/security/permissionas.html
[9] Permission Element, Android development Guide, http://developer.android.com/guide/topics/manifest/permission-element.h tml
[10] Systems Internet Infrastructure Security Laboratory. Department of Computer Science and Engineering. The Pennsylvania State University, A Study of Android Application Security, by William Enck, Damien Octeau, Patrick McDaniel and Swarat Chaudhari http://dl.acm.org/citation.cfm?id=2028088
[11] Symposium on Usable Privacy and Security (SOUPS) 2012, July 11-13,2012, Washington, DC, USA, Android Permissions: User Attention, Comprehension and Behavior by: Adrienne Porter Flet, Elizabeth Hay, Serge Egelman, Ariel Haneyy, Erika Chin, David Wagner Computer Science Department School of Information. University of California, Berkeley
[12] Smart Devices, Ubiquitous Computing Smart Devices, Environments and Interactions by: Stefan Poslad Queen Mary, University of London, UK
[13] J.Burns. Exploraory Android Surgery (talk slides), Black Hat Technical Security Conference USA, May 2009. http://www.blackhat.com/html/bhusa-09/bhusa-09-archives.html
[14] NIST, Descriptions of SHA-1 http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA1.pdf
[15] Gartner research Smartphone sales operating system http://www.gartner.com/newsroom/id/2665715
[16] Android APK Architecture, http://devmaze.wordpress.com/2011/05/22/android-application-android-l ibraries-and-jar-libraries/
[17] Systems and Internet Infrastructure security, Pennsylvania State University, Understanding Android’s security framework by: William Enck, Patrick McDaniel
Department of IT, PIIT Panvel, Mumbai University, India, 9819829042
No. of Downloads: 6 | No. of Views: 1527
S. Venkataramana, G. V. Satya Sri Sai, J. D. S. Preetham, J. Mohan Sai, K. Jashwanth Sree.
March 2025 - Vol 13, Issue 2
Sheharyar Nasir, Shumail Sahibzada, Farrukh Sher Malik.
March 2025 - Vol 13, Issue 2
D. Ratna Giri, K. Satya Vijay Ram, K. Vijendra , G. Durgesh Babu, D. D. Siva Ganesh.
March 2025 - Vol 13, Issue 2