scholarly journals Vulnerability Evaluation Method through Correlation Analysis of Android Applications

2019 ◽  
Vol 11 (23) ◽  
pp. 6637
Author(s):  
Cheolmin Yeom ◽  
Yoojae Won

Due to people in companies use mobile devices to access corporate data, attackers targeting corporate data use vulnerabilities in mobile devices. Most vulnerabilities in applications are caused by the carelessness of developers, and confused deputy attacks and data leak attacks using inter-application vulnerabilities are possible. These vulnerabilities are difficult to find through the single-application diagnostic tool that is currently being studied. This paper proposes a process to automate the decompilation of all the applications on a user’s mobile device and a mechanism to find inter-application vulnerabilities. The mechanism generates a list and matrix, detailing the vulnerabilities in the mobile device. The proposed mechanism is validated through an experiment on an actual mobile device with four installed applications, and the results show that the mechanism can accurately capture all application risks as well as inter-application risks. Through this mechanism, users can expect to find the risks in their mobile devices in advance and prevent damage.

Information ◽  
2020 ◽  
Vol 11 (6) ◽  
pp. 304 ◽  
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The Android platform is currently targeted by malicious writers, continuously focused on the development of new types of attacks to extract sensitive and private information from our mobile devices. In this landscape, one recent trend is represented by the collusion attack. In a nutshell this attack requires that two or more applications are installed to perpetrate the malicious behaviour that is split in more than one single application: for this reason anti-malware are not able to detect this attack, considering that they analyze just one application at a time and that the single colluding application does not exhibit any malicious action. In this paper an approach exploiting model checking is proposed to automatically detect whether two applications exhibit the ability to perform a collusion through the SharedPreferences communication mechanism. We formulate a series of temporal logic formulae to detect the collusion attack from a model obtained by automatically selecting the classes candidate for the collusion, obtained by two heuristics we propose. Experimental results demonstrate that the proposed approach is promising in collusion application detection: as a matter of fact an accuracy equal to 0.99 is obtained by evaluating 993 Android applications.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2208
Author(s):  
Jesús D. Trigo ◽  
Óscar J. Rubio ◽  
Miguel Martínez-Espronceda ◽  
Álvaro Alesanco ◽  
José García ◽  
...  

Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions). The tests performed included a small-scale and a boundary scenario. For the former, two sizes of images were tested; for the latter, the two versions of the embedding algorithm were tested. The results show that the system is fast enough (less than 1 s) for most mHealth telemonitoring services. The architecture provides users with friendly (images shared via social media), straightforward (fast and inexpensive), secure/private and interoperable mHealth services.


2020 ◽  
Vol 10 (23) ◽  
pp. 8351
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a method to detect inter-app communication i.e., a colluding communication between different applications with data support to silently exfiltrate sensitive and private information. We based the proposed method on model checking, by representing Android applications in terms of automata and by proposing a set of logic properties to reduce the number of comparisons and a set of logic properties automatically generated for detecting colluding applications. We evaluated the proposed method on a set of 1092 Android applications, including different colluding attacks, by obtaining an accuracy of 1, showing the effectiveness of the proposed method.


2016 ◽  
Vol 9 (1) ◽  
pp. 141-154 ◽  
Author(s):  
Victoria A. Seitz ◽  
Nada M. Aldebasi

AbstractThe mobile device market, particularly for smart phones, has experienced incredible growth over the past five years. What sets this market apart is the use of applications or apps for just about anything from information to purchases. The purpose of the study was to examine the effectiveness of branded apps on consumers’ attitudes toward brands as well as purchase intentions. The sample was drawn from students enrolled at a southwestern university in the United States, resulting in 50 usable questionnaires. Results of Pearson’s correlation analysis indicated that using branded apps strongly influenced users’ attitudes toward brands; however, using branded apps had a smaller impact on purchase intentions. As well, attitudes towards the branded apps, although significant, had a limited impact on purchase intentions. Implications of the findings were then discussed.


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


2010 ◽  
Vol 7 (4) ◽  
pp. 813-822 ◽  
Author(s):  
Daniel Fuentes ◽  
Juan Álvarez ◽  
Juan Ortega ◽  
Luis Gonzalez-Abril ◽  
Francisco Velasco

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user?s contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.


2010 ◽  
Vol 14 (1) ◽  
pp. 115-124 ◽  
Author(s):  
Weijan Shen ◽  
Fock-Lai Tan

This paper presents the experimental study of using phase change material in the cooling of the mobile devices. It investigates the thermal performance of transient charging and discharging of mobile devices in three different situations; making phone calls frequently, making long duration calls, and making occasional calls. The results show that mobile devices are heated up fastest during the long duration usage. Experiments are also conducted to determine the effect of fins and effect of orientation of the mobile device on its thermal performance.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5451
Author(s):  
Loreto Pescosolido ◽  
Emilio Ancillotti ◽  
Andrea Passarella

Optical wireless LANs (OWLs) constitute an emerging networking paradigm for indoor scenarios’ fit to different smart cities’ fields of applications. Commercial products employing this technology have been made available on the market in recent years. In this work, we investigate, through a set of indoor communication experiments based on commercially available products, how different environmental and usage modes affect the performance of the system, addressing the presence of multiple users, the position and mobility of the mobile devices, the handover among adjacent cells and the effect of background lighting. Our finding shows that the system is quite robust with respect to the variation of operational conditions. We show that, in most conditions, the links can reliably sustain a stable throughput, achieving at least 50% of the throughput achieved with using the maximum light intensity of the transmitting lamp, while they are affected in a very mild way by factors like position and height of the mobile device, and virtually unaffected by variations in the background light.


Sign in / Sign up

Export Citation Format

Share Document