scholarly journals SafeCandy: System for security, analysis and validation in Android

2015 ◽  
Vol 13 (35) ◽  
pp. 89-102 ◽  
Author(s):  
Sebastián Londoño ◽  
Christian Urcuqui ◽  
Manuel Fuentes Amaya ◽  
Johan Gómez ◽  
Andrés Navarro Cadavid

Android is an operating system which currently has over one billion active users for all their mobile devices, a market impact that is influencing an increase in the amount of information that can be obtained from different users, facts that have motivated the development of malicious software by cybercriminals. To solve the problems caused by malware, Android implements a different architecture and security controls, such as a unique user ID (UID) for each application, while an API permits its distribution platform, Google Play applications. It has been shown that there are ways to violate that protection, so the developer community has been developing alternatives aimed at improving the level of safety. This paper presents: the latest information on the various trends and security solutions for Android, and SafeCandy, an app proposed as a new system for analysis, validation and configuration of Android applications that implements static and dynamic analysis with improved ASEF. Finally, a study is included to evaluate the effectiveness in threat detection of different malware antivirus software for Android.

Author(s):  
Yu. M. Barkalov ◽  
A. D. Nesterov

Objectives The article presents a formal model of information security in mobile devices running the Android operating system, an example of detection and investigation of malicious software, as well as static and dynamic analysis of malicious software.Method To protect sensitive information on mobile devices, you can use software and organizational measures at the same time.Result The proposed formal model of information security and analysis of suspected malicious software will ensure the security of information in mobile devices, as well as reduce the risk of threats to an acceptable level at a minimum cost of the protection system. The presented algorithm of the application designed for illegal transfer of funds, as well as an example of the analysis of this application will allow the specialist to improve the quality of their professional tasks in the analysis of incidents in the field of information security.Conclusion Due to the fact that today there is no scientifically based method of detection and analysis of malicious software in the memory of mobile devices, the information provided in this article will help to improve the efficiency of information protection in mobile devices running the Android operating system. 


2018 ◽  
Vol 7 (4.15) ◽  
pp. 30
Author(s):  
Sami Azam ◽  
Rajvinder Singh Sumra ◽  
Bharanidharan Shanmugam ◽  
Kheng Cher Yeo ◽  
Mirjam Jonokman ◽  
...  

It is a known fact that Android mobile phones’ security has room for improvement. Many malicious app developers have targeted     android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request           permission only during runtime, but not all users have this update. This is important because user permission is required to perform    certain actions. The permissions may be irrelevant to the features provided by an application. The purpose of this research is to          investigate the use and security risk of seeming irrelevant permissions in applications available from Google store. Two different        applications which seem to ask irrelevant permissions during installation were selected from Google store. To test these applications, static analysis, dynamic analysis and reverse engineering tools were used. Findings show potentially malicious behavior, demonstrating that downloading apps from Google play store do not guarantee security.  


Author(s):  
Dmitriy A. Izergin ◽  
Mikhail A. Eremeev ◽  
Shamil G. Magomedov ◽  
Stanislav I. Smirnov

One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control. The cornerstone of this concept is mobile devices that solve the issue of operational data exchange and processing. Modern mobile services used including the exchange and processing of personalized, banking and critical data are the result of the steady increase in the number of crimes in the field of information security in relation to and using mobile devices. The widespread use of these devices for access to protected information contained in information systems has given special importance to the issue of information security.The subject of this research is to assess the current state of information security mechanisms for mobile operating systems that form the basis of the structure of episodic distributed mobile networks. The Android OS (operating system) was used as an example. The article discusses the problems of the development of a mobile ecosystem and methods aimed at solving them, the main vectors of malicious impact, ways of countering the means of static and dynamic analysis and modern protection mechanisms.


Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


Author(s):  
Kiran Khatter ◽  
Sapna Malik

Being an open source operating system, android mobiles are attacked by hundreds of malware every year. Moreover, malware are using many veiled techniques that makes it difficult to detect them. Android official markets and the Google Play Store are also not left untouched by malware. This article presents the Ranking and Risk Factor Scheme (RRFS), a hybrid intrusion detection technique for Android devices for the detection of malicious android applications. Ranking and risk factor schemes perform an analysis of Android permissions requested and system calls invoked features by ranking these features with some criteria and calculating the risk factor of each application for the detection and classification of malicious applications of 81 malware families. In the results, the ranking and risk factor scheme outperforms several related approaches and has the detection and classification performance of 99.2% and 88.7%, respectively and proved fast, an energy-efficient technique for resource constraint mobile device


2019 ◽  
Vol 2 (2) ◽  
pp. 59-66
Author(s):  
Ida Bagus Ary Indra Iswara ◽  
Putu Praba Santika ◽  
I Nyoman Saputra Wahyu Wijaya

The Balinese language which is used in daily life on the island of Bali has experienced a shift in usage so it needs to be preserved. In an effort to preserve the Balinese language and script, the Provincial Government issued Bali Governor Regulation Number 20 of 2013 and Regulation number 1 of 2018. I Made Suatjana submitted a proposal that the Balinese script be included in Unicode to make it easier to display Balinese script on digital media. Cokorda Rai Adi Pramartha developed keyboards or keyboards and an application called T@miang to facilitate typing Balinese characters on computer devices. Computer equipment is slowly becoming obsolete, replaced by mobile devices used by 53.03% of users in Indonesia, so it is necessary to build a Balinese script keyboard that can be used on mobile devices. PaTik Bali is built for mobile devices with Android operating system. PaTik Bali layout is adapted to T@miang keyboard layout. PaTik Bali version 1.0 only uses the Balinese script on each keyboard key. In version 2.0 each button on PaTik Bali has been added Latin letters because of the large number of entries on the Google Play page. Based on data recorded on the Google Play Console, there are 41,820 devices that have installed the Balinese Keyboard (PaTik Bali) application, 99.19% are from Indonesia. In general, the PaTik Bali application can be accepted in the community, this can be seen from the average rating given by users on Google Play which is 4.27 on a scale of 5. However, some users complain about the incorrect form of letters. The PaTik Bali application uses fonts that have been embedded in the Android operating system so that it can be used as a keyboard in other applications. This font still has enough problems. To fix this problem, it is necessary to develop the Balinese font then ask Google as an Android developer to enter the new font into the Android operating system. 


2018 ◽  
pp. 468-491
Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


2019 ◽  
Vol 255 ◽  
pp. 05005 ◽  
Author(s):  
Alimardani Hamidreza ◽  
Nazeh Mohammed

As mobile devices grow in popularity, they have become indispensable in people's daily lives, keeping us connected to social networks, breaking news, and the entire Internet. While there are multiple competing platforms, Google's Android is currently the most popular operating system for mobile devices. This popularity has drawn attention of hackers as well. Thus far, research works have analysed Android permissions individually, which makes analysis complex and time consuming. In this work, we propose categorizing Android permissions based on Google's recommendation and perform LSTM analysis on data. The used datasets are Drebin and AndroZoo, which are the most complete and well-respected among research community. The experiment results show that LSTM achieved 91% of true positive rate.


2015 ◽  
Vol 12 (2) ◽  
pp. 1792 ◽  
Author(s):  
Ahmet Arslan ◽  
Mehmet Elibol

<p>The aim of this study is to examine the educational augmented reality applications developed for mobile devices. In accordance with this aim, mobile educational augmented reality applications restricted by Android operating system were searched under the keywords “Augmented Reality and Education” in the Google Play Store and the first 100 results enumerated according to the downloading number were taken under review and evaluated from different perspectives. This evaluation addresses the following points: (1) whether the evaluated applications have the characteristics of augmented reality, (2) market category of the applications where they are published, (3) the table formed as a result of classification of the researchers, (4) distribution of the subjects in the applications, (5) the area on which augmented reality application runs, (6) last update date of augmented reality applications and (7) downloading number of augmented reality applications. After evaluation of these points 18 applications which take much attention and are considered as important for the education have been evaluated in detail. As the result of study, it was concluded that augmented reality applications run mainly on paper and when the pointer on the paper is swiped as augmented reality they are video – playing applications.</p><p> </p><p><strong>Özet</strong></p><p>Bu çalışmanın amacı mobil cihazlar için geliştirilmiş eğitsel artırılmış gerçeklik uygulamalarını incelemektir. Bu amaç doğrultusunda Android işletim sistemi ile sınırlandırılan mobil eğitsel arttırılmış gerçeklik uygulamaları Google Play Markette indirilme sayısına göre listelenen ilk 100 sonuç değerlendirmeye alınarak çeşitli açılardan incelenmiştir. Yapılan bu incelemeler şu noktaları kapsamaktadır: (1) incelemeye alınan uygulamaların artırılmış gerçeklik özelliği taşıyıp taşımadığı, (2) uygulamaların yayınlandıkları market kategorisi, (3) araştırmacıların kategorilendirme sonucu oluşan tablo, (4) uygulamalarda işlenen konuların dağılımı, (5) artırılmış gerçeklik uygulamasının çalıştığı alan, (6) artırılmış gerçeklik uygulamalarının son güncellenme tarihleri ve (7)artırılmış gerçeklik uygulamalarının indirilme sayıları. Bu noktalarda yapılan incelemelerin ardından dikkat çeken ve eğitim için önemli olduğu düşünülen 18 adet uygulama detaylıca incelenerek tanıtımları yapılmıştır. Araştırma sonucunda, artırılmış gerçeklik uygulamalarının ağırlıklı olarak kağıt (kitap, dergi, çıktı) üzerinde çalıştığı ve artırılmış gerçeklik olarak kağıt üzerindeki işaretleyici okutulduğunda video oynatan uygulamalar şeklinde olduğu tespit edilmiştir.</p>


Sign in / Sign up

Export Citation Format

Share Document