Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application
|
|
|
- Millicent Bell
- 10 years ago
- Views:
Transcription
1 Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application Miss. Ashwini A. Dongre M. E. 3 rd sem, Dept. of Computer Science and engineering P. R. Patil College of engineering Amravati, India [email protected] Prof. C. J. Shelke Prof. Dept. of Computer Science and engineering P. R. Patil College of engineering Amravati, India [email protected] Abstract Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. In this paper we have reviewed android security model, application level security in android and its security issues. Keywords- Android, vulnerability, malwares, smart phones ***** I. INTRODUCTION The smart phone devices are uses in a range of individual to large enterprises. It will be use for both personal and professional purpose smart phones have become the new personal computer. Consistent performance and ease of handling of the device lets you perform most of the operations often done on a Pc s. These mobile devices are being used not only for just making calls or messaging, but also for interacting with social networking Websites and sometimes performing sensitive financial transactions. There are many operating systems available for the smart phones, one of this is The Android operating system. Android is a modern mobile platform which is designed to be truly open source. The Android applications can uses advanced level of both hardware and software as well as local and server data, through this platform developer bring innovation and value to consumers. Android platform must have security mechanism to ensure security of user data, information, application and network [1]. To provide security in Open source platform needs strong and rigorous security architecture. The Android is designed with multi-layered security which will provides flexibleness needed by an open source, whereas providing protection for all users of the platform designed to a software stack android includes a middleware and core application as a complete [2]. Android architecture is designed with keep ease of development ability for developers. The Security controls have designed to minimize the load on developers. The Developers have to simply work on versatile security controls because developers are not familiar with securities that apply by defaults on applications. A. Android Platform Security Architecture: Android seek to be the most secure and usable operating system for mobiles by repur-posing classical operating system security controls to protect user data as well as system res-ources and provides isolation in application. Android provides following security features to achieve these objectives are first robustness at the operating system level through the Linux kernel. second compulsory application sandbox for all applications. third secure inter process communication. Fourth application signing and fifth application defined permission and user have to grant permissions. Figure-1 Android Architecture Figure 1 summarizes security components and considerations at the various levels of the Android Architecture. Each component assumes that component below is properly secured. Except some Android operating system code running as root and all process run above the Linux Kernel is restricted by the Application Sandbox. B. Security in Android 1. Android is open source platform, developers will work along to enhance it[1]. 2. Android platform is multitasking software; therefore no application will gain critical access to the components of OS[3]. 3. Android platform is UNIX based operating system that is the most secure operating system[1]. 3674
2 4. The developers need a unique signature to publish their application on market[4]. 5. Users will report a possible security flaw through their Google account. 6. All applications on android need permission from the user at the time of installation. C. Security Issues faced by Android Android is not secure as it appear, even when such robust security measures. There are several security problems faced by the android, which are given below: 1. Android has no security scan over the apps being uploaded on its market. 2. There are some apps which can exploit the services of another app without permission request. 3. Android s permission security model provides power to user to make a decision whether an app should be trusted or not. 4. The Open Source is available to legitimate developers as well as hackers too. So that the Android framework cannot be trusted when it comes to develop critical systems. 5. The Android operating system developers clearly state that they are not responsible for the security of external storage. 6. Any app on the android platform will access device data just like the GSM and SIM marketer Ids while not the permission of the user. II. LITERATURE SURVEY W. Enck, D. Octeau, P. McDaniel and S. Chaudhuri presented review paper on a study of Android application security. Introduces the ded decompiler which generate android application source code directly from its installation image. Also they design and execute a horizontal study of smart phone applications based on static analysis of 21 million lines of recovered code. This analysis uncovered pervasive use, misuse of personal or phone identifiers and deep penetration of advertizing and analytics networks [5]. S. Powar, Dr. B. B. Meshram, review on Android security framework, Describes android security framework. Raising exposure of open source Smartphone is increasing the security risk. The android provide a basic set of permissions to secure smart phone. The method to make Android security mechanism more versatile and the current security mechanism is too rigid. The user has only two options at the time of application installation first allow all requested permissions and second deny requested permissions leads to stop installation [6]. S. Kaur and M. Kaur present implementing security on Android application. They have described how security can be improved in android system for users to safely use the android smart phones [2]. S. Smalley and R. Craig presented in Security Enhanced (SE) Android: Bringing Flexible MAC to Android. The android software stack for mobile devices enforces and defines its own security model for apps through its application-layer permissions model. but, at its foundation, the android depends upon the UNIX operating system kernel to shield the system from malicious or imperfect apps and to isolate apps from each other. Now, android leverages UNIX operating system discretionary access control (DAC) to enforce these guarantees. although the notable shortcomings of DAC. this paper, motivates and describe their work to bring flexible mandatory access control (MAC) to Android by enabling the effective use of Security Enhanced Linux (SELinux) for kernel-level MAC and by developing a set of middleware MAC extensions to the Android permissions model [7]. P. Gilbert, W. Enck, A.N. Sheth, L.P. Cox, B.G. Chun, J. Jung and P. McDaniel presented TaintDroid: An Information-Flow Tracking System for Real-time Privacy Monitoring on smart phones. Currently smart phone operating systems often fail to provide users with sufficient control over and visibility into how third-party applications use their private stuff. They address these shortcomings with TaintDroid, the system-wide dynamic taint tracking and analysis system capable of at the same time tracking multiple sources of private data. The TaintDroid display real-time analysis by leveraging Android s virtualized execution environment and Monitoring private data to inform use of third-party applications for phone users and valuable input for Smart phone security service firms seeking to identify misbehaving applications [8]. B. J. Berger, M. Bunke and K. Sohr presented an android security case study with Bauhaus. In this paper analysis, they discovered that firms and corporation now uses security software for code analysis to discover security problems in application. They carried out a case analysis on android based mobile in cooperation with a security expert and employed the reverse engineering tool-suite Bauhaus for security assessment. During the investigation they found some inconsistencies in the implementation of the Android security concept. Based on the case study, they suggest several research topics in the area of reverse engineering that would support a security analyst during security assessments [9]. M. Ongtang, S. McLaughlin, W. Enck and P. McDaniel review on Semantically Rich Application-Centric Security in Android. In this, they have augment the existing android operating system with a framework to meet security requirements and they proposed secure application interaction, improved infrastructure that governs install-time permission assignment and their run-time use as dictated by application provider strategy. Secure application interaction provides necessary utility for applications to assert and control the security decisions on the android platform[10]. H. G. Schmidt, A.D. Schmidt, J. Clausen, A. Camtepe, S. Albayrak, K. Ali Yüksel and O. Kiraz review on enhancing security of Linux-based android devices. presents an analysis of security mechanism in Android Smart phones with a focus on Linux. Results of their discussion can be applicable for android as well as Linux-based smart phones. They analyzed android structure and the Linuxkernel to check security functions. They also review well accepted security mechanisms and tools which could increase device security. And they provided details on how to adopt these security tools on Android platform and overhead analysis of techniques in terms of resource usage [11]. 3675
3 C. Marforio, A. Francillon, S. Capkun study on application collusion attack on the permission-based security model and its implications for modern smartphone systems. In this they show technique in which permission based mechanisms are used on mobile platforms allows attacks by colluding applications that communicate over explicit and covert communication channel. These bugs for security allow applications to indirectly execute operations that those applications based on their declared permissions that should not be able to carry out. Example operations include disclosure of user s private data (e.g., phone book and calendar entries) to remote parties by applications that do not have direct access to such data or cannot directly establish remote connections. They more showed that on mobile platforms users are not aware of possible implications of application collusion quite the contrary users are implicitly lead to believe that by approving the installation of each application independently based on its declared permissions and that will limit the damage that an application can cause [12]. They show that this is not correct and that application permissions should be displayed to the users differently reflecting their actual implications. A. Warg,M. Lange, S. Liebergeld, A. Lackorzynski, M. Peter represented L4Android: a generic operating system framework for secure smart phones. They present a generic operating system framework that overcomes the need of hardware extensions to provide security in smart phones. They bind smart phone operating system in a virtual machine; this framework allows highly secure applications to run sideby- side with the VM. Which is based on a state-of-the-art micro-kernel that ensures isolation between the virtual machine and secure applications [13]? T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin work on attacks on WebView in the android system. Web-View is an important element in android platforms, enabling smart phones and tablet apps to insert a simple but powerful browser. To achieve a much better interaction between apps and their embedded browsers, WebView provides range of APIs, permitting code in apps to invoke the JavaScript code within pages which intercept their events and modify those events. Using these features apps will become customized browsers for their required web applications. Now, within the android market, 86 % of the top twenty most downloaded apps in ten various classes use WebView14. The architecture of WebView changes the landscape of the web particularly from the security viewpoint. Two essential component of the Web's security infrastructure are weakened if Web-View and its APIs are used: the Trusted Computing Base (TCB) at the client aspect and therefore the sandbox protection enforced by browsers. Resulting several attacks may be launched either against apps or by them [14]. D. Barrera, H. Güne S. Kayacık, P.C. van Oorschot, A. Somayaji discuss on a methodology for empirical analysis of permission-based security models and its application to android. According to paper, the proposed methodology is of independent interest for visualization of permission based systems beyond current Android-specific empirical analysis. Authors provide some discussion identifying potential points of improvement for the android permission model, trying to augment quality where required without increasing number variety of permissions or overall difficulty [15]. C. Gibler, J. Crussell, J. Erickson and H. chen case learn on AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. Under this published, they have presented a static analysis framework for automatically finding potential leaks of sensitive data in android applications on a large scale. AndroidLeaks severely reduces the number of applications and the number of traces that a security auditor must verify manually [16] I. Burguera, U. Zurutuza, S. Nadjm study on Crowdroid: behaviour-based malware detection system for Android. In this paper, they used earlier approaches for dynamic analysis of application behaviour for detecting malware in the android. The detector is embedded in framework for collection of traces from limitless number of real users. This framework has been demonstrated by analysing information composed in the central server using two sorts of data sets: those from artificial malware created for test functions, and people from real malware found in the globe. The technique is shown to be an effective means of analytic the malware and alerting the users of a downloaded malware. This method is avoiding the spreading of a detected malware to a larger scales [17]. M.L. Polla, F. Martinelli and D. Sgandurra discuss a survey on security for mobile devices. This surveys the vulnerabilities and security solutions over year , this targets high-level attacks on user applications. In this they cluster existing approaches aimed to securing mobile devices against these kinds of attacks into many categories on the basis of the detection architectures, principles, collected information and operating systems. They mainly focus on IDS-based models and tools. This categorization aim to provide a simple and concise view of the underlying model adopted by each approach [18]. W. B. Tesfay, T. Booth, and K. Andersson review reputation based security model for android applications. They planned a cloud based reputation security model as a solution which greatly mitigates the malicious attacks targets the Android market[19]. This way of security solution uses unique user id (UID) which is assign to each application in the android platform. This type of model stores the status of Android applications in an anti-malware providers cloud (AM Cloud). In the investigational results witness that the proposed model can identify the reputation index of a given application and its potential of being risky or not[20]. A. D. Schmidt, S. A. Camtepe, T. Blasing, L. Batyuk and S. Albayrak analysed an android application sandbox system for suspicious software detection. They project an AASandbox (Android Application Sandbox) which performs static as well as dynamic analysis on android applications to detect suspicious applications. The Static analysis scans the software packages for malicious patterns without installing it along with the dynamic analysis executes the app in an isolated environment, i.e. sandbox, that intervenes and logs low-level interactions with the system. Either the sandbox or the detection algorithms can be deployed in the cloud, providing a quick and distributed detection of suspicious application in an app store similar to Google s Play Store.The AASandbox might be used to improve the anti-virus apps available for the android devices [21]. 3676
4 T. Vidas, D. Votipka, N. Christin discuss on all your detection on android. Since Smart phones become popular droid are belong to us: a survey of current android attacks. for sensitive information and apps, improved malware According to this they look to Android as a specific instance detection mechanisms are necessary complying with the of mobile computing. They all first discuss the Android resource constraints28. The contribution of this review is two security model and then some potential weaknesses of the fold. Firstly, they execute static analysis on the executables to model. Then they should provide taxonomy of attacks to the extract their operate calls in android environment using the platform established by real attacks that in the end guarantee command readelf. Method call lists are matched with malware privileged access to the device [22]. executables for classifying them with part, Nearest Neighbor S. Holla, M. M Katti study on Android based mobile Algorithms and Prism.And the Second, they present a application development and its security. In this they discuss cooperative malware detection approach to improve result a layered approach for android application development [28]. where they can build up application which downloads data G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, from the server and also an Android Application Sandbox discuss on MADAM: a multi-level anomaly detector for (AASandbox) that is able to perform both the static and the android malware. In this analysis, MADAM can monitors dynamic analysis on Android programs who automatically android at the kernel-level and user-level to notice real detect suspicious applications [23]. malware infections using machine learning techniques to A. Pretschner, D. Feth studied on flexible datadriven differentiate between normal behaviors and malicious ones. security for android. They should propose an The primary prototype of MADAM is able to notice several improved security system beyond the standard permission real malware found in the world. The device is not affected by system. This is possible to implement complex policies that MADAM due to the low range of false positives generated are built on temporal, cardinality, and spatial conditions in the after the training phase[29]. related system. The Enforcement can be done by means of A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, Yael modification or inhibition of certain events. Leveraging recent Weiss, analysis Andromaly: a behavioral malware detection advances in information flow of tracking technology, policies framework for android devices. The proposed framework can also pertain to data rather than single representations of realizes a Host- based Malware Detection System that that data [24]. continuously monitors various features and events obtained G. Portokalidis, P. Homburg, K. Anagnostakis, and from the mobile device and apply Machine Learning anomaly H. bos represented Paranoid Android: versatile protection for detectors to classify the collected data as normal or abnormal. smartphones. They suggest a solution in which security They developed four malicious applications and check checks are applied on remote security servers that host exact Andromaly s ability to detect new malware based on samples replicas of the phones in virtual environments. The servers are of known malware. They evaluated many combinations of not subject to equivalent constraints, permitting user to use anomaly detection algorithms, feature choice methodologies multiple detection techniques at the same time. They in order to find out the combination that yields the best developed a prototype of this security model for android performance in detecting new malware on android[30]. phones, and show that it is each practical and scalable: they generate no more than 2KiB/s and 64B/s of trace data for III. PROPOSED WORK high-loads and idle operation respectively, and are able to support quite 100 replicas running on one server[25]. A.D. Schmidt and S. Albayrak represented paper on malicious software for smartphones. They discuss a list of the most common behavior patterns and investigate possibilities how to exploit the given standard Symbian OS API for additional malware functionalities [26]. J. Cheng, S. H.Y. Wong, H. Yang and S. metal present SmartSiren: virus detection and alert for smart phones. They represented SmartSiren collects the communication activity information from the smart phones, and performs joint analysis to discover both single-device and system-wide abnormal behaviors. They were used a proxybased design to load process load from resource constrained smart phones and simplify the collaboration among smart phones. Once a potential virus is detected then the proxy quarantines the natural event causation targeted alerts to those directly vulnerable smart phones. After that they have demonstrated feasibleness of SmartSiren through implementation on Dopod 577w smart phone, and evaluated its effectiveness victimization simulations driven by 3-week SMS traces from a national cellular carrier [27]. A.D. Schmidt, R. Bye, H.G. Schmidt, J. Clausen, O. Kiraz, K. Yuksel, A. Camtepe, and S. Albayrak, review on static analysis of executables for collaborative malware Proposed System Working: 1. The user will try to install an application to his/her device 2. The application would be sent to our cloud server 3. The cloud server would check the application by decompiling it 4. Once decompile the application would be check for Malware 5. If Malwares are found the application will not be installed 6. If no Malware found then application will be installed Diagrammatic Representation Fig.2. Diagrammatic view of proposed System 3677
5 IV. CONCLUSION Now days more than 1 million Android device are activated. The android has very few restrictions for developer which will increases the security risk for end users. In this paper we have reviewed security issues in the Android based Smart phones. The integration of technologies into an application certification process requires overcoming logistical and technical challenges. The android provides more security than other mobile phone platforms. REFERENCES [1] Android Open Source Project. Android Security Overview ) [2] Kaur S. and Kaur M., Review Paper on Implementing Security on Android Application, Journal of Environmental Sciences, Computer Science and Engineering & Technology, 2(3), (2013) [3] Android Open Source Project Security and permissions permissions.html. (2013) [4] Android Open Source Project Publishing on GooglePlay play/ publish /preparing.html. (2013) [5] Enck W., Octeau D., McDaniel P. and Chaudhuri S., A Study of Android Application Security, The 20th USENIX conference on Security, 21-21, (2011) [6] Powar S., Meshram B. B., Survey on Android Security Framework, International Journal of Engineering Research and Applications, 3(2), (2013) [7] Smalley S. and Craig R., Security Enhanced (SE) Android BringingFlexibleMACtoAndroid, www. Internetsociety.org/sites/default/files/02_4.pdf. (2012) [8] Enck W., Gilbert P., Chun B.G., Cox L.P., Jung J., McDaniel P. and Sheth A.N., TaintDroid: An Information- Flow Tracking System for Realtime Privacy Monitoring on Smartphones, 9th USENIX Symposium on Operating Systems Design and Implementation. (2010) [9] Berger B.J., Bunke M., and Sohr K., An Android Security Case Study with Bauhaus, Working Conference on Reverse Engineering, (2011) [10] [10] Ongtang M., McLaughlin S., Enck W. and McDaniel P., Semantically Rich Application-Centric Security in Android Computer Security Applications Conference, (2009) [11] Schmidt A.D., Schmidt H.G., Clausen J., Camtepe A., Albayrak S. and Yuksel K. Ali and Kiraz O., Enhancing Security of Linux-based Android Devices, _security. pdf (2008) [12] Marforio C., Francillon A. and Capkun S., Application Collusion Attack on the Permission-Based Security Mode and its Implicatios for Modern Smartphone Systems,ftp://ftp.inf.ethz.ch/doc/tech-reports/7xx/724.pdf (2013) [13] Lackorzynski A., Lange M., Warg A., Liebergeld S., Peter M., L4Android: A Generic Operating System Framework for Secure Smartphones, 18th ACM Conference on Computer and Communications Security, (2011) [14] Luo T., Hao H., Du W., Wang Y. and Yin H., Attacks on WebView in the Android System, 27th Annual Compute Security Applications Conference, (2011) [15] Barrera D., Güne H., Kayacık S., Oorschot P.C. van and Somayaji A., A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android, 17th ACM conference on Computer and communications security, (2010) [16] Gibler C., Crussell J., Erickson J. and Chen H., Android Leaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large Scale, 5th international conference on Trust and Trustworthy Computing, (2012) [17] Burguera I., Zurutuza U. and Tehrani S.N., Crowdroid: behaviour-based malware detection system for Android, 1st ACM workshop on Security and privacy in smartphones and mobile devices, (2011) [18] Polla M.L., Martinelli F., and Sgandurra D., A Survey on Security for Mobile Devices, Communications Surveys & Tutorials, IEEE, 15(1), (2013) [19] Tesfay W.B., Booth T., and Andersson K., Reputation Based Security Model for Android Applications, Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, (2012) [20] Bing H., Analysis and Research of Systems Security Based on Android, Intelligent Computation Technology and Automation, (2012) [21] Bläsing T., Batyuk L., Schmidt A.D., Camtepe S.A. and Albayrak S., An Android Application Sandbox system for suspicious software detection, Malicious and Unwanted Software, (2010) [22] Vidas T., Votipka D. and Christin N., All Your Droid Are Belong To Us: A Survey of Current Android Attacks, The 5th USENIX conference on Offensive technologies, (2011) [23] Holla S. and Katti M.M., Android based mobile application development and its Security, International Journal of Computer Trends and Technology, 3(3), (2012) [24] Feth D., Pretschner A., Flexible Data-Driven Security for Android, The 2012 IEEE Sixth International Conference on Software Security and Reliability, (2012) [25] Portokalidis G., Homburg P., Anagnostakis K. and Bos H. Paranoid android: versatile protection for smartphones, Computer Security Applications Conference, (2010) [26] Schmidt A.D. and Albayrak S., Malicious software for smartphones, labor.de / fileadmin /files/publications/smart phone_ malware pdf (2008) [27] Cheng J., Wong H.Y., Yang H. and Lu S., Smartsiren: virus detection and alert for smartphones, Mobile Systems,Applications, and Services, (2007) [28] Schmidt A.D., Bye R., Schmidt H.G., Clausen J., Kiraz O. and Yuksel K., A. Camtepe, and S. Albayrak, Static analysis of executables for collaborative malware detection on android, 2009 IEEE International Confernece on Communications, 1-5 (2009) [29] Dini G., Martinelli F., Saracino A. and Sgandurra D.MADAM: a multi-level anomaly detector for android malware, ANCS.pdf (2012) [30] Shabtai A., Kanonov U., Elovici Y., Glezer C. and Y. Weiss, Andromaly: a behavioural malware detection framework for android devices, Journal of Intelligent Information Systems, 38(1), (2012) 3678
Review on Android and Smartphone Security
Review Paper Abstract Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Vol. 1(6), 12-19, November (2013) Review on Android and Smartphone Security Tiwari Mohini, Srivastava
A Review on Android Security
A Review on Android Security Dr. Vikash Kumar Singh 1, Devendra Singh Kushwaha 2, Raju Sujane 3, Roshni Tiwari 4 Head (I/C), Dept. of computer Science IGNTU Amarkantak (M.P.) 1 Assistant Professor, Faculty
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
Reputation Based Security Model for Android Applications
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications Reputation Based Security Model for Android Applications Welderufael Berhane Tesfay, Todd Booth, and
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
Detection and Identification of Android Malware Based on Information Flow Monitoring
Detection and Identification of Android Malware Based on Information Flow Monitoring Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong To cite this version: Radoniaina Andriatsimandefitra, Valérie
Berlin Institute of Technology FG Security in Telecommunications
Berlin Institute of Technology FG Security in Telecommunications Weiss L4Android: A Generic Operating System Framework for Secure Smartphones Workshop on Security and Privacy in Smartphones and Mobile
A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development
Firewall-based Solution for Preventing Privilege Escalation Attacks in Android
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones
A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones Anushree Pore, Prof. Mahip Bartere PG Student, Dept. of CSE, G H Raisoni College of Engineering, Amravati, Maharashtra,
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015
Lynn Margaret Batten IT Security Research Services & Deakin University, Melbourne, Australia June 2015 Smart devices versus PCs WebView versus Web 2.0 Tracking Certificates Mallory Countermeasures. On
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
AppRAy: UseRdRiven And fully AUtomAted AndRoid App security Assessment. dennis titze, philipp stephanow, dr. JUliAn schütte
FraunhoFer InstItute For applied and Integrated security AppRAy: UseRdRiven And fully AUtomAted AndRoid App security dennis titze, philipp stephanow, dr. JUliAn schütte App-Ray: User-driven and Fully Automated
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security
Permission Based Malware Detection Approach Using Naive Bayes Classifier Technique For Android Devices. Pranay Kshirsagar, Pramod Mali, Hrishikesh Bidwe. Department Of Information Technology G. S. Moze
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
SECURITY IN ANDROID BASED SMARTPHONE
SECURITY IN ANDROID BASED SMARTPHONE Mr. Sumedh P. Ingale 1, Prof. Sunil R. Gupta 2 1 ME (CSE),First Year,Department of CSE,Prof. Ram Meghe Institute Of Technology and Research, Badnera,Amravati. Sant
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
API Tracing Tool for Android-Based Mobile Devices
API Tracing Tool for Android-Based Mobile Devices Seonho Choi, Michael Bijou, Kun Sun, and Edward Jung Abstract We developed an Application Programming Interface (API) tracing tool for Android-based mobile
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users
RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users Bahman Rashidi Virginia Commonwealth University [email protected] Carol Fung Virginia Commonwealth University
MOBSAFE: ANALYSIS OF ANDROID MOBILE APPLICATIONS USING CLOUD COMPUTING AND DATA MINING
Journal homepage: www.mjret.in ISSN:2348-6953 MOBSAFE: ANALYSIS OF ANDROID MOBILE APPLICATIONS USING CLOUD COMPUTING AND DATA MINING Pranjali Deshmukh, Prof.Pankaj Agarakar Computer Engineering DR. D.Y.Patil
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Securing the endpoint and your data
#SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Discovering Computers
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events You Joung Ham and Hyung-Woo Lee devices, and analyses the characteristics of malicious apps with activation pattern
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux 2.2.2 (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or
Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation Leandro Fiorin, Alberto Ferrante Konstantinos Padarnitsas, Francesco Regazzoni University of Lugano Lugano, Switzerland
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Introduction to Android 5 Security
Introduction to Android 5 Security Lukáš Aron and Petr Hanáček Faculty of Information Technology, Department of Intelligent Systems, Brno University of Technology [email protected] Abstract. This paper
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Three Ways to Secure Virtual Applications
WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Android Security. Giovanni Russello [email protected]
Android Security Giovanni Russello [email protected] N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS Caner Kilinc,
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Crowdroid: Behavior-Based Malware Detection System for Android
Crowdroid: Behavior-Based Malware System for Iker Burguera and Urko Zurutuza Electronics and Computing Department Mondragon University 20500 Mondragon, Spain [email protected], [email protected]
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
