A Study on Applied Technology in Safety and Protection of the Android OS

Article Preview

Abstract:

As the world’s most widely used phone operating system, Android has been chosen to get our lives convenient. However, as the importance of the services our cell phones support increases, so too do the opportunities for invasion. More attention should be paid to the risks of Android OS. In this paper, we analyze the Android security and then give methods based on Android privilege to prevent invasion while using or developing. The method can make users avoid most of the hacking.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

468-472

Citation:

Online since:

December 2013

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Android Developers Application Fundamentals, web information on http: /developer. android. com/guide/components/fundamentals. html.

Google Scholar

[2] Hannah Gommerstadt and Devon Long, Android Application Security: A Thorough Model and Two Case Studies: K9 and Talking Cat, unpublished.

Google Scholar

[3] Android Developers <permission>, web information on http: /developer. android. com/guide/topics/manifest/permission-element. html.

Google Scholar

[4] Android Developers Processes and Threads, web information on http: /developer. android. com/guide/components/processes-and-threads. html.

Google Scholar

[5] Enck W, OngTang M and McDaniel P, Understanding Android Security, IEEE SECURITY & PRIVACY, 2009, web information on http: /css. csail. mit. edu/6. 858/2013/readings/android. pdf.

DOI: 10.1109/msp.2009.26

Google Scholar

[6] Burns J, DEVELOPING SECURE MOBILE APPLICATIONS FOR ANDROID: An introduction to making secure Android applications, ISEC Technical Report, 2008, web information on https: /www. isecpartners. com/media/11991/isec_securing_android_apps. pdf.

Google Scholar

[7] J. Jeon, K. K. Micinski, J. A. Vaughan, N. Reddy, Y. Zhu, J. S. Foster, and T. Millstein. Dr. Android and Mr. Hide, Fine-grained security policies on unmodified Android, CSTR Technical Report , 2011, web information on http: /www. cs. umd. edu/~jfoster/papers/cs-tr-5006. pdf.

DOI: 10.1145/2381934.2381938

Google Scholar