Analysis of the Security Mechanism of Android and Countermeasures

Article Preview

Abstract:

Now, as the security threats for the Android phone increasing, the security problem about the smart mobile-phone has become a focus of the topic. In this paper, we take the security problems on Android operating system as the study object .Our contribution in this paper is two-fold. First, SQLite database is the mainly way for data storage on Android, but no security mechanism was provided in SQLite, we implement data encryption technique refer to the common database security mechanism. Second, in order to solve the security threats existing in the traditional phone, we also give a design and implementation of multi-function mobile phone firewall.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2948-2951

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Batyuk L, Herpich M, CAMTEPE S. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android application. In Proceedings of the 6th International Conference on Malicious and Unwanted Software. 2011: 66-72.

DOI: 10.1109/malware.2011.6112328

Google Scholar

[2] Ongtang M, McLaughlin S, Enck W. Semantically rich application centric security in Android. Security and Communication Networks. 2012, 5(6): 658-673.

DOI: 10.1002/sec.360

Google Scholar

[3] Dietz M, Shekhar S, Pisetsky Y, et al. Quire: Lightweight provenance for smart phoneoperating systems. Proceedings of the 20th USENIX Security Symposium. 2011: 23-34.

Google Scholar