Analysis of security trends and control methods in Android platform

Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat
{"title":"Analysis of security trends and control methods in Android platform","authors":"Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat","doi":"10.1109/CIPECH.2014.7019100","DOIUrl":null,"url":null,"abstract":"We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIPECH.2014.7019100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Android平台安全趋势及控制方法分析
我们都熟悉智能手机,它们的技术和功能增强让用户的生活更轻松。今天有成千上万的应用程序存在于游戏商店中,满足了我们日常生活的需要。这些在线应用程序商店在一分钟内为用户提供数十万个应用程序。所有用户都知道,任何个人在play store中运行其应用程序都没有如此高的限制和政策。这是由于android环境中,应用程序仅通过数字签名机制以及来自android生态系统的服务器开发人员的粗粒度授权进行验证。最近,IccTA调查了大约3000个基于实时的应用程序,准确率为88%,并在20个应用程序中发现了大约150个相互关联的安全漏洞。目前,由于将个人信息输入到异构应用程序中,隐私数据泄露率很高。对于调试器来说,跟踪安全过程和策略以防止数据泄漏是一个很大的挑战。本文描述了通过android系统的隐私控制机制来检测和防止android隐私泄露的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Hybrid CMOS-memristor 4T-NVSRAM cell for low power applications VLSI architecture and implementation of statistical multiplexer A comparative analysis of ant colony optimization for its applications into software testing Neurofuzzy inference system for diagnosis of Leukemia Computation & analysis of aluminum and steel structures by using ABAQUS software for engineering applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1