Risk Analysis of Android Apps and Fake ID Flaw Solution Model
In this era of modern technology where everyone rely on the latest technical specifications especially concerning with the latest mobiles and apps. Keeping this in mind the various software companies have launched their own operating system for mobile, and in the same field ‘Google’ also launched their own mobile operating system android which has its own technicality and specification which is competing with the other company’s operating system. After using the android in mobile, people came to know that some problems have been faced by the android user and the problem is not hardware related but in fact it is the major flaw of the android operating system which is considered as the fake ID problem. This flaw allow hacker to impersonate the trusted application and potentially hijack the users mobile phone, extracting all the critical data from the mobile and the result would be catastrophic. Various solutions have been proposed by the researchers around the globe to overcome this problem. Here, I am providing a specific method to overcome this critical flaw of android operating system.
Cite this Article
Shristi Pandey, Ravi Kant, Vijendra Singh. Risk analysis of android apps and fake ID flaw solution model. Journal of Mobile Computing, Communications and Mobile Networks. 2015; 2(3): 46–58p.
Fire Eye Security Reimagined: Out of Pocket, a comprehensive mobile threat assessment report of 7 million iOS and Android Apps. 2015. http://www.idgconnect.com/view_abstract/29173/out-pocket-a-comprehensive-mobile-threat-assessment-million-ios-android-apps.
Machigar Ongtang et al. Semantically Rich Application-Centric Security in Android. https://www.acsac.org/2009/openconf/modules/request.php?module=oc_program&action=view.php&id=207
RSA Conference 2015. Android Security Data from the Frontline. https://www.rsaconference.com/writable/presentations/file_upload/mbs-t07r-android-security-data-from-the-front-lines.pdf
HISPASEC Spanish National Cyber Security Institute, Android Malware Situation. https://www.incibe.es/blogs/post/Security/SecurityBlog/Article_and_comments/report_on_the_android_malware_situation
Johnson et al. Analysis of Android Applications Permissions. " Software Security and Reliability Companion (SERE-C), 2012 IEEE Sixth International Conference on. IEEE, 2012.
Vanessa et al. A Survey of Android Malware Characterisitics and Mitigation Techniques. ." Information Technology: New Generations (ITNG), 2014 11th International Conference on. IEEE, 2014.
Jinhua et al. Research Of Secure Ecosystem Based On Android Platform. 2013; 376–380p.
Faruki et al. Android Security: A Survey of Issues, Malware Penetration and Defenses.
Isohara et al. Kernel-based Behavior Analysis for Android Malware Detection. Computational Intelligence and Security (CIS), Seventh International Conference on. IEEE, 2011
Zhou et al. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 2014.
Tesfay W, Booth T and Andersson K et al. Reputation Based Security Model for Android Applications. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012.
Shin et al. Towards Formal Analysis of the Permission-based Security Model for Android. Wireless and Mobile Communications, 2009. ICWMC'09. Fifth International Conference on. IEEE, 2009.
Sun et al. Application Policy Security Mechanisms of Android System. In 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, IEEE, 2012; 1722–1725p.
Tang et al. Extending Android Security Enforcement with A Security Distance Model. Internet Technology and Applications (iTAP), 2011 International Conference on. IEEE, 2011.
Faruki et al. Senior Member, IEEE, and Muttukrishnan Rajarajan, Android Security: A Survey of Issues, Malware Penetration, and Defenses.
- There are currently no refbacks.