International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Review on Android and Smartphone Security

Author Affiliations

  • 1NRI Institute of Information Science and Technology, Bhopal,Madhya Pradesh, INDIA
  • 2NRI Institute of Information Science and Technology, Bhopal,Madhya Pradesh, INDIA
  • 3NRI Institute of Information Science and Technology, Bhopal,Madhya Pradesh, INDIA

Res. J. Computer & IT Sci., Volume 1, Issue (6), Pages 12-19, November,20 (2013)

Abstract

Android has the biggest market share among all Smartphone operating system. Security is one of the main concerns for Smartphone users today. As the power and features of Smartphone’s increase, so has their vulnerability for attacks by viruses etc. Perhaps android is more secured operating system than any other Smartphone operating system today. Android has very few restrictions for developer, increases the security risk for end users. In this paper we have reviewed android security model, application level security and security issues in the Android based Smartphone.

References

  1. 1., , Android Open Source Project. Android Security Overview.http://source.android.com/devices/tech/security/index.html.(2013)
  2. 2. Kaur S. and Kaur M., Review Paper on, ImplementingSecurity on Android Application,, Journal of EnvironmentalSciences, Computer Science and Engineering &Technology, 2(3), (2013)
  3. 3., , Android Open Source Project. Security and permissions.http://developer.android.com/guide/topics/security/permissions.html. (2013)
  4. 4., , Android Open Source Project. Publishing on GooglePlay.http://developer.android.com/distribute/googleplay/publish/preparing.html. (2013)
  5. 5. Enck W., Octeau D., McDaniel P. and Chaudhuri S., A, Study of Android Application Security,, The 20th USENIXconference on Security, 21-21, (2011)
  6. 6. Powar S., Meshram B. B.,, Survey on Android SecurityFramework,, International Journal of Engineering Researchand Applications, 3(2), (2013)
  7. 7. Smalley S. and Craig R.,, Security Enhanced (SE) Android:Bringing Flexible MAC to Android,, www.internetsociety.org/sites/default/files/02_4.pdf . (2012)
  8. 8. Enck W., Gilbert P., Chun B.G., Cox L.P., Jung J.,McDaniel P. and Sheth A.N.,, TaintDroid: An InformationFlowTracking System for Realtime Privacy Monitoring onSmartphones,, 9th USENIX Symposium on OperatingSystems Design and Implementation. (2010)
  9. 9. Berger B.J., Bunke M., and Sohr K.,, An Android SecurityCase Study with Bauhaus,, Working Conference on ReverseEngineering, 179–183 (2011)
  10. 10. Ongtang M., McLaughlin S., Enck W. and McDaniel P.,, Semantically Rich Application-Centric Security in Android,, Computer Security Applications Conference, 340–349(2009)
  11. 11. Schmidt A.D., Schmidt H.G., Clausen J., Camtepe A.,Albayrak S. and Yuksel K. Ali and Kiraz O.,, EnhancingSecurity of Linux-based Android Devices,, http://www.dailabor.de/fileadmin/files/publications/lk2008-android_security.pdf (2008)
  12. 12. Marforio C., Francillon A. and Capkun S.,, ApplicationCollusion Attack on the Permission-Based Security Modeland its Implications for Modern Smartphone Systems,, ftp://ftp.inf.ethz.ch/doc/tech-reports/7xx/724.pdf (2013)
  13. 13. Lackorzynski A., Lange M., Warg A., Liebergeld S., PeterM.,, L4Android: A Generic Operating System Frameworkfor Secure Smartphones,, 18th ACM Conference onComputer and Communications Security, 39-50 (2011)
  14. 14. Luo T., Hao H., Du W., Wang Y. and Yin H.,, Attacks onWebView in the Android System,, 27th Annual ComputerSecurity Applications Conference, 343-352 (2011)
  15. 15. Barrera D., Güne H., Kayacik S., Oorschot P.C. van andSomayaji A.,, A Methodology for Empirical Analysis ofPermission-Based Security Models and its Application toAndroid,, 17th ACM conference on Computer andcommunications security, 73–84 (2010)
  16. 16. Gibler C., Crussell J., Erickson J. and Chen H.,, AndroidLeaks: Automatically Detecting Potential Privacy Leaks InAndroid Applications on a Large Scale,, 5th internationalconference on Trust and Trustworthy Computing, 291-307(2012)
  17. 17. Burguera I., Zurutuza U. and Tehrani S.N.,, Crowdroid:behaviour-based malware detection system for Android,, 1stACM workshop on Security and privacy in smartphonesand mobile devices, 15-26 (2011)
  18. 18. Polla M.L., Martinelli F., and Sgandurra D.,, A Survey onSecurity for Mobile Devices, Communications Surveys &Tutorials,, IEEE, 15(1), 446–471 (2013)
  19. 19. Tesfay W.B., Booth T., and Andersson K.,, ReputationBased Security Model for Android Applications, Trust,Security and Privacy in Computing and Communications,, IEEE Computer Society, 896-901 (2012)
  20. 20. Bing H.,, Analysis and Research of Systems Security Basedon Android,, Intelligent Computation Technology andAutomation, 581–584 (2012)
  21. 21. Bläsing T., Batyuk L., Schmidt A.D., Camtepe S.A. andAlbayrak S.,, An Android Application Sandbox system forsuspicious software detection,, Malicious and UnwantedSoftware, 55-62 (2010)
  22. 22. Vidas T., Votipka D. and Christin N.,, All Your Droid AreBelong To Us: A Survey of Current Android Attacks,, The5th USENIX conference on Offensive technologies, 10-10(2011)
  23. 23. Holla S. and Katti M.M.,, Android based mobile applicationdevelopment and its Security,, International Journal ofComputer Trends and Technology, 3(3), 486-490 (2012)
  24. 24. Feth D., Pretschner A.,, Flexible Data-Driven Security forAndroid,, The 2012 IEEE Sixth International Conference onSoftware Security and Reliability, 41-50 (2012)
  25. 25. Portokalidis G., Homburg P., Anagnostakis K. and Bos H.,, Paranoid android: versatile protection for smartphones,, Computer Security Applications Conference, 347–356(2010)
  26. 26. Schmidt A.D. and Albayrak S.,, Malicious software forsmartphones,, https://www.dailabor.de/fileadmin/files/publications/smartphone_malware.pdf (2008)
  27. 27. Cheng J., Wong H.Y., Yang H. and Lu S.,, Smartsiren: virusdetection and alert for smartphones,, Mobile Systems,Applications, and Services, 258–271 (2007)
  28. 28. Schmidt A.D., Bye R., Schmidt H.G., Clausen J., Kiraz O.and Yuksel K., A. Camtepe, and S. Albayrak,, Staticanalysis of executables for collaborative malware detectionon android,, 2009 IEEE International Confernece onCommunications, 1-5 (2009)
  29. 29. Dini G., Martinelli F., Saracino A. and Sgandurra D.,, MADAM: a multi-level anomaly detector for androidmalware,, http://www.iet.unipi.it/g.dini/research/papers/2012-MMMANCS.pdf(2012)
  30. 30. Shabtai A., Kanonov U., Elovici Y., Glezer C. and Y.Weiss,, Andromaly: a behavioural malware detectionframework for android devices,, Journal of IntelligentInformation Systems, 38(1), 161-190 (2012)
  31. 31. Enck W., Ongtang M., and McDaniel P.,, UnderstandingAndroid security,, IEEE Security Privacy, 7 (2009)
  32. 32. Schmidt A.D., Peters F., Lamour F. and Albayrak S.,, Monitoring Smartphones for Anomaly Detection,, 1stinternational conference on MOBILe WirelessMiddleWARE, Operating Systems, and Applications,Article No. 40 (2008)
  33. 33., Android Open Source Project. What is Android?, http://developer.android.com/about/index.html (2013)