Android平台安全趋势及控制方法分析

Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat
{"title":"Android平台安全趋势及控制方法分析","authors":"Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat","doi":"10.1109/CIPECH.2014.7019100","DOIUrl":null,"url":null,"abstract":"We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Analysis of security trends and control methods in Android platform\",\"authors\":\"Payal Mittal, Bhawna Dhruv, Praveen Kumar, S. Rawat\",\"doi\":\"10.1109/CIPECH.2014.7019100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.\",\"PeriodicalId\":170027,\"journal\":{\"name\":\"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIPECH.2014.7019100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIPECH.2014.7019100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

我们都熟悉智能手机,它们的技术和功能增强让用户的生活更轻松。今天有成千上万的应用程序存在于游戏商店中,满足了我们日常生活的需要。这些在线应用程序商店在一分钟内为用户提供数十万个应用程序。所有用户都知道,任何个人在play store中运行其应用程序都没有如此高的限制和政策。这是由于android环境中,应用程序仅通过数字签名机制以及来自android生态系统的服务器开发人员的粗粒度授权进行验证。最近,IccTA调查了大约3000个基于实时的应用程序,准确率为88%,并在20个应用程序中发现了大约150个相互关联的安全漏洞。目前,由于将个人信息输入到异构应用程序中,隐私数据泄露率很高。对于调试器来说,跟踪安全过程和策略以防止数据泄漏是一个很大的挑战。本文描述了通过android系统的隐私控制机制来检测和防止android隐私泄露的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of security trends and control methods in Android platform
We all are familiar with smart phones and their technical & functional enhancement which makes user life much easier. There are thousands of applications present in play store today which fulfils our everyday life's needs. These Online Application Stores gives user hundreds of thousands of application in one minute. All users are aware of the fact that any individual run its application in play store with no such high restrictions and policies. It is due to android environment in which applications are only verified through mechanism of digital signatures along with coarse grained grant from server developers of android ecosystems. Recently IccTA surveyed a range of approximate 3000 realtime based applications with accuracy of 88% and founded around 150 interlinked security leaks in 20 applications. These days, a high rate of privacy data leaks comes under surveillance which arises due to feeding personal information into heterogeneous applications. It is a big challenge for the debuggers to trace security procedures and policies to prevent data leakage. In this paper, we describe methods of detecting and preventing android privacy leakage through privacy control mechanisms of android systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信