Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat
{"title":"Android平台安全趋势及控制方法分析","authors":"Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat","doi":"10.1109/CIPECH.2014.7019100","DOIUrl":null,"url":null,"abstract":"We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Analysis of security trends and control methods in Android platform\",\"authors\":\"Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat\",\"doi\":\"10.1109/CIPECH.2014.7019100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.\",\"PeriodicalId\":170027,\"journal\":{\"name\":\"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIPECH.2014.7019100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIPECH.2014.7019100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of security trends and control methods in Android platform
We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.