Evaluating Smartphone Application Security: A Case Study on Android

1
Muneer Ahmad Dar & Javaid Parvez
Muneer Ahmad Dar & Javaid Parvez

Send Message

To: Author

GJCST Volume 13 Issue E12

Article Fingerprint

ReserarchID

CSTNWS9TQ18

Evaluating Smartphone Application Security: A Case Study on Android Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Currently, smart phones are becoming indispensable for meeting the social expectation ofalways staying connected and the need for an increase inproductivity are the reasons for the increase in smartphone usage. One of the leaders of the smart phone evolution is Google’s Android operating system. It ishighly likely that Android is going to be installed in manymillions of cell phones during the near future. With thepopularity of Android smart phones everyone finds it convenient to make transactions through these smartphones because of the openness of Android applications. The malware attacks are also significant. Androidsecurity is complex and we evaluate an applicationdevelopment environment which is susceptible tomalware attacks. This paper evaluates Android securitywith the purpose of identifying a secure applicationdevelopment environment for performing securetransactions on Android-based smart phones.

28 Cites in Articles

References

  1. (2018). GMC investigates baby drug death (24 July 1998); http://news.bbc.co.uk/1/ hi/health/ Overdose doctor cleared (20 April 1999); http://news.bbc.co.uk/1/hi/ health/138612.stm Doctor thought overdose was safe (21 April 1999); http://news.bbc. co.uk/1/hi/health/325228.stm Overdose doctors cleared (23 April 1999); http://news.bbc.co.uk/1/hi/ health/326656.stm (All websites accessed 18 April 2007).
  2. Hongwei Luo,†,Guili He,†,Xiaodong Lin,§,Xuemin( Sherman) Shen (2012). Towards Hierarchical Security Framework for Smartphones.
  3. P Ferrill (2011). Exploring the android api.
  4. Harunobu Agematsu,Junya Kani,Kohei Nasaka,Hideaki Kawabata,Takamasa Isohara,Keisuke Takemori,Masakatsu Nishigaki (2012). A Proposal to Realize the Provision of Secure Android Applications -- ADMS: An Application Development and Management System.
  5. J Jamaluddin,N Zotou,P Coulton (2004). Mobile phone vulnerabilities: a new generation of malware.
  6. (2010). Symposium on Operating Systems Design and implementation (OSDI'10).
  7. Keisuke Takemori,Hideaki Kawabata,Takamasa Isohara,Ayumu Kubota,Jyunichi Ikeno (2011). Restriction framework for Android application -Whitelist-based installation.
  8. Hideaki Kawabata,Takamasa Isohara,Keisuke Takemori,Ayumu Kubota (2011). Threat of Script abuse Android Permissions and Static Analysis.
  9. Adrienne Felt,Matthew Finifter,Erika Chin,Steve Hanna,David Wagner (2011). A survey of mobile malware in the wild.
  10. Ruben Jonathan,Garcia Vargas (2012). Security Controls for Android.
  11. R Rogers,J Lombardo,Z Mednieks,B Meike (2009). Android application development: Programming with the Google SDK.
  12. C Guo,H Wang,W Zhu (2004). Smart-phone attacks and defenses.
  13. D Dagon,T Martin,T Starner (2004). Mobile Phones as Computing Devices: The Viruses are Coming!.
  14. M Goadrich,M Rogers (2011). Smart smartphone development: ios versus android.
  15. Robert Gove (2012). V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies.
  16. S Salah,S Abdulhak,H Sug,D Kang,H Lee (2011). Performance analysis of intrusion detection systems for smartphone security enhancements.
  17. M Pelino (2009). Predictions 2010: Enterprise Mobility Accelerates Again.
  18. Angel Alonso,Parrizas (2011). Securely deploying Android devices.
  19. Lukas Jeter,Meenakshi Mani,Tia Reinschmidt,Shivakant Mishra (2011). Malware Threat in Android Operating System.
  20. (2011). Android Open Source Project, Google.
  21. S Smalley (2012). SE Android release.
  22. (Janu). SEAndroid Project Page.
  23. William Enck,Machigar Ongtang,Patrick Mcdaniel (2009). On lightweight mobile phone application certification.
  24. A Fuchs,A Chaudhuri,J Foster Scandroid: Automated security certification of android applications.
  25. Mohammad Nauman,Sohail Khan,Xinwen Zhang (2010). Apex.
  26. Machigar Ongtang,Kevin Butler,Patrick Mcdaniel (2010). Porscha.
  27. M Conti,V Nguyen,B Crispo (2011). Crepe: Context-related policy enforcement for android.
  28. Sven Bugiel,Lucas Davi,Alexandra Dmitrienko,Thomas Fischer,Ahmad-Reza Sadeghi,Bhargava Shastry (2011). Poster.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Muneer Ahmad Dar. 1969. \u201cEvaluating Smartphone Application Security: A Case Study on Android\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E12): .

Download Citation

Article content is being processed or not available yet.

Issue Cover
GJCST Volume 13 Issue E12
Pg. 9- 15
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 25425
Total Downloads: 10628
2026 Trends
Research Identity (RIN)
Related Research

Article in Review

Currently, smart phones are becoming indispensable for meeting the social expectation ofalways staying connected and the need for an increase inproductivity are the reasons for the increase in smartphone usage. One of the leaders of the smart phone evolution is Google’s Android operating system. It ishighly likely that Android is going to be installed in manymillions of cell phones during the near future. With thepopularity of Android smart phones everyone finds it convenient to make transactions through these smartphones because of the openness of Android applications. The malware attacks are also significant. Androidsecurity is complex and we evaluate an applicationdevelopment environment which is susceptible tomalware attacks. This paper evaluates Android securitywith the purpose of identifying a secure applicationdevelopment environment for performing securetransactions on Android-based smart phones.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Evaluating Smartphone Application Security: A Case Study on Android

Muneer Ahmad Dar & Javaid Parvez
Muneer Ahmad Dar & Javaid Parvez

Research Journals