A Comprehensive Analysis of Android Security and Proposed Solutions

作者: Asim S Yuksel , Abdul H Zaim , Muhammed A Aydin , None

DOI: 10.5815/IJCNIS.2014.12.02

关键词:

摘要: The increasing popularity of smart devices have led users to complete all their daily work with these devices. Users are now able shop online, share information the applications that they install on Installed gain access various sensitive information, such as user's contact list, phone number, location. However, there is no control mechanism in place can check whether safe install. Therefore, installed according users' decisions, without any limitations or warnings. As a result, become target malicious applications, and personal security privacy compromised. In this study, we investigate solutions aim protect Android users. We reveal shortcomings mobile shed light research community. Additionally, present taxonomy Android-based solutions.

参考文章(27)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Exposing Security Risks for Commercial Mobile Devices Lecture Notes in Computer Science. pp. 3- 21 ,(2012) , 10.1007/978-3-642-33704-8_2
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky, AppGuard: enforcing user requirements on android apps tools and algorithms for construction and analysis of systems. pp. 543- 548 ,(2013) , 10.1007/978-3-642-36742-7_39
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Farnam Jahanian, Jon Oberheide, Evan Cooke, CloudAV: N-version antivirus in the network cloud usenix security symposium. pp. 91- 106 ,(2008)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Ross Anderson, Hassen Saïdi, Rubin Xu, Aurasium: practical policy enforcement for Android applications usenix security symposium. pp. 27- 27 ,(2012)
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert, Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform Trust and Trustworthy Computing. pp. 1- 15 ,(2010) , 10.1007/978-3-642-13869-0_1
Ryan Stevens, Jonathan Ganz, Vladimir Filkov, Premkumar Devanbu, Hao Chen, Asking for (and about) permissions used by Android apps mining software repositories. pp. 31- 40 ,(2013) , 10.1109/MSR.2013.6624000
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou, Analysis of Android Applications' Permissions 2012 IEEE Sixth International Conference on Software Security and Reliability Companion. pp. 45- 46 ,(2012) , 10.1109/SERE-C.2012.44