CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities

by Tauseef Ibne Mamun, Lamia Alam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 1
Year of Publication: 2016
Authors: Tauseef Ibne Mamun, Lamia Alam
10.5120/ijca2016908649

Tauseef Ibne Mamun, Lamia Alam . Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities. International Journal of Computer Applications. 137, 1 ( March 2016), 14-21. DOI=10.5120/ijca2016908649

@article{ 10.5120/ijca2016908649,
author = { Tauseef Ibne Mamun, Lamia Alam },
title = { Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 1 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 14-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number1/24239-2016908649/ },
doi = { 10.5120/ijca2016908649 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:21.215911+05:30
%A Tauseef Ibne Mamun
%A Lamia Alam
%T Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 1
%P 14-21
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the popularity of Android smart phones everyone finds it convenient to make transactions through these smart phones. And the users of these smart phones, in most cases unaware of different types of threats. The purpose for this survey paper is to conduct a survey on users to get the information about the security vulnerabilities they are creating unknowingly, bringing forward some security frameworks for these threats & giving a basic knowledge to the new comer to the android about android OS architecture and the threats to this architecture.

References
  1. http://news.bbc.co.uk/2/hi/technology/7266201.stm
  2. Choosilp, Wichien, and Yujian Fu. "A Case STUDY OF MALWARE DETECTION AND REMOVAL IN ANDROID APPS."
  3. http://blog.trendmicro.com/trendlabs-security-intelligence/the-hidden-dangers-in-third-party-app-sites
  4. Tse, Daniel, X. Liu, Christopher Nusaputra, B. Hu, Y. Wang, and M. W. Xing. "STRATEGIES IN IMPROVING ANDROID SECURITY." (2014)
  5. www.acumin.co.uk
  6. http://www.konsultek.com/10/cyber-attacks-2/fireeye-discovers-emails-carrying-malware-in-android-devices
  7. Fuchs, Adam P., Avik Chaudhuri, and Jeffrey S. Foster. "Scandroid: Automated security certification of android applications." Manuscript, Univ. of Maryland, http://www. cs. umd. edu/avik/projects/scandroidascaa 2, no. 3 (2009).
  8. Ongtang, Machigar, Stephen McLaughlin, William Enck, and Patrick McDaniel. "Semantically rich application‐centric security in Android."Security and Communication Networks 5, no. 6 (2012): 658-673.
  9. Barrera, David, H. Güneş Kayacik, Paul C. van Oorschot, and Anil Somayaji. "A methodology for empirical analysis of permission-based security models and its application to android." In Proceedings of the 17th ACM conference on Computer and communications security, pp. 73-84. ACM, 2010.
  10. Felt, Adrienne Porter, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. "Android permissions demystified." In Proceedings of the 18th ACM conference on Computer and communications security, pp. 627-638. ACM, 2011.
  11. Marforio, Claudio, and Aurélien Francillon. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Department of Computer Science, ETH Zurich, 2011.
  12. Powar, Swapnil, and B. B. Meshram. "Survey on Android Security Framework." International Journal of Engineering Research and Applications3, no. 2 (2013): 907-911.
  13. Gibler, Clint, Jonathan Crussell, Jeremy Erickson, and Hao Chen.AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. Springer Berlin Heidelberg, 2012.
  14. Conti, Mauro, Vu Thien Nga Nguyen, and Bruno Crispo. "CRePE: Context-related policy enforcement for Android." In Information Security, pp. 331-345. Springer Berlin Heidelberg, 2011.
  15. Enck, William, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. "TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones." ACM Transactions on Computer Systems (TOCS) 32, no. 2 (2014): 5.
  16. Enck, William, Machigar Ongtang, and Patrick McDaniel. "On lightweight mobile phone application certification." In Proceedings of the 16th ACM conference on Computer and communications security, pp. 235-245. ACM, 2009.
  17. Ho, Tsung-Hsuan, Daniel Dean, Xiaohui Gu, and William Enck. "PREC: practical root exploit containment for android devices." In Proceedings of the 4th ACM conference on Data and application security and privacy, pp. 187-198. ACM, 2014.
  18. Nauman, Mohammad, Sohail Khan, and Xinwen Zhang. "Apex: extending android permission model and enforcement with user-defined runtime constraints." In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 328-332. ACM, 2010.
  19. Burguera, Iker, Urko Zurutuza, and Simin Nadjm-Tehrani. "Crowdroid: behavior-based malware detection system for android." In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 15-26. ACM, 2011.
  20. Shabtai, Asaf, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. "“Andromaly”: a behavioral malware detection framework for android devices." Journal of Intelligent Information Systems 38, no. 1 (2012): 161-190.
  21. Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra. "MADAM: A Multi-level Anomaly Detector for Android Malware." In MMM-ACNS, vol. 12, pp. 240-253. 2012.
  22. Schmidt, Aubrey-Derrick, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer Yüksel, Seyit Camtepe, and Sahin Albayrak. "Static analysis of executables for collaborative malware detection on android." InCommunications, 2009. ICC'09. IEEE International Conference on, pp. 1-5. IEEE, 2009.
  23. Tesfay, Welderufael Berhane, Todd Booth, and Karl Andersson. "Reputation based security model for android applications." In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 896-901. IEEE, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Android Security Framework Security Vulnerabilities User Unawareness Android App Permission Malware Detection Survey on User Awareness.