scholarly journals The Myths of and Solutions for Android OS Controlled and Secure Environment

Author(s):  
Imants Gorbāns ◽  
Ivans Kulesovs ◽  
Uldis Straujums ◽  
Jānis Buls

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"><span lang="EN-US">The practical experience as well as direct testing show that part of Android applications may contain a malware. The harmful characteristics of an application often become visible only after some runs, or after an update, or after a harmful web content is downloaded and shown by the application. It is observed that applications often try to get an unauthorized or inattentively authorized access to user data and send it outside the device. </span></p><p class="R-AbstractKeywords"><span lang="EN-US">The situation with Android applications gets more and more out of the control. The authors propose a solution to overcome the security issues, while respecting the latest Google solutions. Target group of the proposal are users that use smartphone or tablet both for private and corporate needs, i.e. Bring Your Own Device (BYOD) case.</span></p><p class="R-AbstractKeywords"><span lang="EN-US">The authors point out and compare four possible Android technical administration solutions based on the unified model for BYOD case. The authors also propose the changes to Android architecture to enhance its security. It is proposed to look at the mobile operating system as a web server. Such principle allows implementing in Android a number of security principles taken from the web servers solutions.</span></p>

Author(s):  
Kashif Ali Dahri ◽  
Muhammad Saleem Vighio ◽  
Baqar Ali Zardari

The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share, the Android operating system has become a prime target for malware developers. When an Android phone is injected with a malware, it may result in compromising the privacy of the user by stealing sensitive and private information like contacts, ids, passwords, photos, call records, and so on. Compared to any other Android-based application category, games are the most preferred zone for attackers, due to the high interest of users in game applications. When an end user downloads a game, which is injected with malicious code, user data is infected without bringing in the knowledge of the user. Though, there still are not sufficient protection mechanisms or guidelines stated for end user against Android malware, this study offers a novel approach to detect Android malware in order to ensure the safe usage of Android applications. The advantage of this approach is its ability to utilize Android manifest files for the detection of malware. The availability of manifest file in every Android application makes this approach applicable to all Android applications. It can also be considered as a lightweight method for malware detection, and its efficiency is experimentally confirmed by testing and comparing the results of 50 Android games samples. Experiments are carried out using the Android Package Kit (APK) tools, and based on the experiments, different kinds of malware identification and prevention guidelines have been proposed for the safe and secure usage of the Android operating system.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 30
Author(s):  
Sami Azam ◽  
Rajvinder Singh Sumra ◽  
Bharanidharan Shanmugam ◽  
Kheng Cher Yeo ◽  
Mirjam Jonokman ◽  
...  

It is a known fact that Android mobile phones’ security has room for improvement. Many malicious app developers have targeted     android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request           permission only during runtime, but not all users have this update. This is important because user permission is required to perform    certain actions. The permissions may be irrelevant to the features provided by an application. The purpose of this research is to          investigate the use and security risk of seeming irrelevant permissions in applications available from Google store. Two different        applications which seem to ask irrelevant permissions during installation were selected from Google store. To test these applications, static analysis, dynamic analysis and reverse engineering tools were used. Findings show potentially malicious behavior, demonstrating that downloading apps from Google play store do not guarantee security.  


CCIT Journal ◽  
2014 ◽  
Vol 7 (3) ◽  
pp. 402-419
Author(s):  
Asep Saefullah ◽  
Diah Ariyani ◽  
Andy Rienauld

An age of fast-paced time is precious, be in a queue sequence is a loss. In addition to timeconsuming, the queue can also restrict other activities to do one. Likewise, when making payments at the checkout counter can be ascertained will be a queue, it needed a solution for IT ( Information Technology ) to overcome losses incurred during the waiting queue. This research is to design and create an application system that can give information about the running queue and facility reservation queue numbers to someone from anywhere via smartphones with the Android operating system. Research using the Android Developer Tools ( ADT ) Bundle suggested by the official Android developer site as a tool to help software developers build, test and debug Android applications. The design of applications using a smartphone galaxy s3 android hardware and language as a programming language as well as software eclipse helper program making. The result is a system application Queue Notifications on smartphones with Android OS, where users can take advantage of the waiting time by not waiting in line at the cash register or point of payment but the queue in the queuing system on a smartphone from anywhere while doing other activities .


2020 ◽  
Vol 17 (4) ◽  
pp. 1557-1565
Author(s):  
Abdesselam Beroual ◽  
Imad Fakhri Al-Shaikhli

Since the last few years, Android is by far the most widely utilized as an operating system for mobile devices, and this is accompanied by the development in terms of number and variety of different Android applications. Android offers a centralized market place maintained by Google named “Google Play Store,” where official and third party application developers can submit their Android applications to make them available for users. The high popularity of Android OS and its market place is becoming a worthy target by hackers and attackers to violate users’ privacy and security. Malwares were also growing in parallel with Android applications growth. It is necessary as a first step to have a solid understanding of malwares’ characteristics to help preventing potential harmful consequences. Whithin this paper, we initially present the general overview for Android OS architecture with application structure, then we highlight the popular Android security issues and focus on the existing solutions to detect and prevent Android malwares, finally, we present our point of view and suggestion for future works on the best solution to overcome the Android malwares.


Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


2018 ◽  
pp. 468-491
Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


2021 ◽  
Author(s):  
Nivedha K ◽  
Indra Gandhi K ◽  
Shibi S ◽  
Nithesh V ◽  
Ashwin M

Android is a widely distributed mobile operating system developed especially for mobile devices with touch screens. It is an open source, Google-distributed Linux-based mobile operating system. Since Android is open source, it enables Android devices to be targeted effectively by malware developers. Third-party markets do not search for malicious applications in their databases, so installing Android Application Packages (APKs) from these uncontrolled market places is often risky. Without user’s notice, these malware infected applications gain access to private user data, send text messages that costs the user, or hide malware apk file inside another application. The total number of new samples of Android malware amounted to 482,579 per month as of March 2020. In this paper deep learning approach that focuses on malware detection in android apps to protect data on user devices. We use different static features that are present in an Android application for the implementation of the proposed system. The system extracts various static features and gives them to the classifier for deep learning and shows the results. This proposed system will assist users in checking applications that are not downloaded from the official market.


2018 ◽  
Vol 13 (1) ◽  
Author(s):  
Evert S. Tangkudung ◽  
Meicsy E.I. Najoan ◽  
Dringhuzen J. Mamahit

Abstrak – Gereja Masehi Injili di Minahasa adalah salah satu organisasi gereja di minahasa yang disingkat dengan GMIM. Dalam peribadatan GMIM Sendiri mempunyai Tata cara ibadah (Liturgy) yang digunakan. Pengertian dari liturgi adalah istilah yang berasal dari bahasa Yunani, leitourgia, yang berarti kerja bersama. Android merupakan sebuah sistem operasi yang digunakan pada kebanyakan smartphone dewasa ini. Antarmuka pengguna pada Android didasarkan pada manipulasi langsung, menggunakan masukan sentuh yang serupa dengan tindakan di dunia nyata. Sampai sekarang, android memiliki berbagai macam versi yang memiliki berbagai fitur baru. Saat ini tata cara ibadah atau liturgy yang di pakai di GMIM masih dalam bentuk manual, sehingga mengakibatkan penyediaan jumlah kertas yang tidak sesuai dengan jumlah jemaat yang hadir. Selain itu dengan menggunakan media kertas ini sering terjadi pemborosan kertas dan banyak menghasilkan sampah di lingkungan gereja. Berdasarkan permasalahan ini peneliti tertarik untuk mengembangkan suatu penelitian dalam bentuk aplikasi android yang dapat membantu mempermudah jemaat mendapatkan informasi tentang tata cara ibadah serta informasi mengenai ibadah sepekan dalam bentuk aplikasi yang terpasang di Smartphone khususnya OS android. Bahasa pemograman yang digunakan adalah bahasa pemograman java yang mendukung aplikasi berbasis android. Data-data untuk aplikasi dibuat menggunakan database MySQL. Dari tahapan-tahapan dalam penelitian ini dihasilkan sebuah aplikasi tata cara ibadah berbasis android. Fitur-fitur yang terdapat dalam aplikasi ini yaitu,tata cara ibadah,jadwal ibadah,lirik lagu yang bertujuan memudahkan dalam penyajian informasi. Kata Kunci : Aplikasi Tata Cara, Application Development, Android, GMIM, Rapid, Sistem Informasi. Abstract - The Evangelical Christian Church in Minahasa is one of the church organizations in Minahasa which is abbreviated as GMIM. In its own GMIM Worship has the Ordinance of worship (Liturgy) used. The sense of the liturgy is a term derived from Greek, leitourgia, meaning joint work. Android is an operating system used on most smartphones today. The user interface on Android is based on direct manipulation, using touch feedback similar to the action in the real world. Until now, android has various versions that have various new features. Currently the ordinance of worship or liturgy in use in GMIM is still in manual form, resulting in the provision of paper quantities that are not in accordance with the number of congregations present. In addition, using paper media is often a waste of paper and a lot of waste in the church environment. Based on this problem researchers interested in developing a research in the form of android applications that can help facilitate the congregation to get information about the procedures of worship as well as information about worship a week in the form of applications installed in the Smartphone, especially android OS. The programming language used is a java programming language that supports android based applications. The data for the application is created using MySQL database. From the stages in this study produced an application of android-based worship procedures. The features contained in this application is, the ordinance of worship, the schedule of worship, the lyrics of the song that aims to facilitate the presentation of information. Keywords: Application Procedures, Application Development, Android, GMIM, Rapid, Information Systems.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1369
Author(s):  
Hyojun Lee ◽  
Jiyoung Yoon ◽  
Min-Seong Jang ◽  
Kyung-Joon Park

To perform advanced operations with unmanned aerial vehicles (UAVs), it is crucial that components other than the existing ones such as flight controller, network devices, and ground control station (GCS) are also used. The inevitable addition of hardware and software to accomplish UAV operations may lead to security vulnerabilities through various vectors. Hence, we propose a security framework in this study to improve the security of an unmanned aerial system (UAS). The proposed framework operates in the robot operating system (ROS) and is designed to focus on several perspectives, such as overhead arising from additional security elements and security issues essential for flight missions. The UAS is operated in a nonnative and native ROS environment. The performance of the proposed framework in both environments is verified through experiments.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


Sign in / Sign up

Export Citation Format

Share Document