CFP last date
20 May 2024
Reseach Article

Analysis of Android Security with the Help of Component Granting Permission

Published on June 2015 by Gajanan V. Jaybhaye, Pushpanjali M. Chouragade
National Conference on Recent Trends in Computer Science and Engineering
Foundation of Computer Science USA
MEDHA2015 - Number 2
June 2015
Authors: Gajanan V. Jaybhaye, Pushpanjali M. Chouragade
34dd0d4a-fa9f-4339-b0ac-404b0e8bf206

Gajanan V. Jaybhaye, Pushpanjali M. Chouragade . Analysis of Android Security with the Help of Component Granting Permission. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 2 (June 2015), 1-3.

@article{
author = { Gajanan V. Jaybhaye, Pushpanjali M. Chouragade },
title = { Analysis of Android Security with the Help of Component Granting Permission },
journal = { National Conference on Recent Trends in Computer Science and Engineering },
issue_date = { June 2015 },
volume = { MEDHA2015 },
number = { 2 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 1-3 },
numpages = 3,
url = { /proceedings/medha2015/number2/21430-8020/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Engineering
%A Gajanan V. Jaybhaye
%A Pushpanjali M. Chouragade
%T Analysis of Android Security with the Help of Component Granting Permission
%J National Conference on Recent Trends in Computer Science and Engineering
%@ 0975-8887
%V MEDHA2015
%N 2
%P 1-3
%D 2015
%I International Journal of Computer Applications
Abstract

Nowadays, the mobile has operating system for which we required security. It works like operating system of personal computer, generally mobile uses android base operating sytem. will granting a permission break the phone's security? Do the access permission assignments to an application's components put the phone or the application at risk? Android currently provides no means of answering these questions. We developed an enhanced installer and security framework to answer a variant of these questions—namely," does an application break some larger phone-wide security policy?" Our tool, called Kirin extracts an application's security policy from its manifest file to determine if the requested permissions and component permission assignments are consistent with the stakeholders' definition of a secure phone. The existing reviews extensively cover the smart phone OS security. However, we believe that the security of Android, with particular focus on malware growth, study of anti-analysis technique and existing detection methodologies needs an extensive coverage.

References
  1. J. P. Anderson, 1. Computer Security Technology Planning Study, tech. report ESD-TR-73-51, Mitre, Oct. 1972.
  2. M. A. Harrison, W. L. Ruzzo, and. J. D. Ullman, "Protection in Operating Systems,"Comm. ACM, vol. 19, no. 8, 1976, pp. 461-471.
  3. L. Badger et al. , "Practical Do- 3. main and Type inforcement for UNIX," Proc. IEEESymp. Security and Privacy, IEEE CS Press, 1995, pp. 66-77.
  4. J. Saltzer and M. Schroeder, "The 4. Protection of Information in Computer Systems,"Proc. IEEE, vol. 63, no. 9, 1975, pp. 1278-1308.
  5. I. Krstic and S. L. Garfinkel, "Bit- 5. frost: The One Laptop per Child Security Model,"
  6. Yan Jin,ShanglangYao. Introduction and practice of Google Androiddevelopment[M]. Beijing:Posts&Telecom Press, July 2009,pp. 12-18.
  7. Google. AndroidReference:Manifest File-Permissions. http://developer. android. com/guide/topics/manifest/manifest-intro. html[EB/OL].
  8. Google. AndroidReference:Security and Permissions. http://developer. android. com/guide/topics/security/security. html[EB/OL].
Index Terms

Computer Science
Information Sciences

Keywords

Component Label Api Sdk App