Securing Mobile Applications
نویسنده
چکیده
W idespread mobile device use has stimulated a rich market for applications. Many apps, however, reveal sensitive user information such as location, movements, and habits1 and/or spread malware.2 Network anonymization techniques alone don’t ensure privacy because the OS together with the invoked mobile apps might still release information that reidentifies users or devices. Even when users are careful not to provide identifying data to smartphone apps over anonymous connections, the apps can leak such information without user knowledge. Thus, we must devise accurate methods of checking apps for the presence of malware and spyware. Although third-party application markets exist, most users download apps from well-known markets such as Google Play, Amazon Appstore, iTunes App Store, and Windows Store. The availability and widespread use of these markets might allow centralized deployment of techniques that identify potentially malicious apps. Uncovering potentially malicious apps isn’t a trivial task. Proposed approaches typically differ in the features they use to identify such apps, their use of machine-learning techniques, and their accuracy. In their 2015 IEEE Transactions on Dependable and Secure Computing article, Lei Cen and his colleagues proposed a highly accurate model for detecting malware in Android apps.3 The authors observed that application markets distribute apps in a form that allows easy decompilation and thus analysis. Moreover, they noted that mobile platforms provide semantically rich APIs. Drawing on these two observations, the authors devised a discriminative probabilistic learning model, based on regularized logistic regression, that detects malware by using apps’ decompiled code and information about required permissions.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملApplicability of Quantum Cryptography for Securing Mobile Communication Networks
After 20 years of basic research, quantum cryptography has meanwhile led to first commercial products. Its progress has triggered high publicity and additional R&D funding. The aim of this paper is to evaluate the status of quantum cryptography regarding its practical applicability for securing (mobile) communication networks. With that aim in mind, the paper presents a survey of the state-of-t...
متن کاملProtecting Applications and Devices in Nomadic Business Environments
This paper presents a pragmatic approach to protect the integrity of execution of an application in a nomadic business environment. Applications run in such contexts are based on the federation of appliances collaborating through direct communication as well as through the distribution of mobile pieces of code. Securing the operation of an application means protecting mobile code since executio...
متن کاملSecuring Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any time and from any location. Increasingly capable mobile platforms and rich, new applications are enabling users to communicate and collaborate anytime and anywhere. However, concerns about the security and reliability o...
متن کاملSecuring dynamic itineraries for mobile agent applications
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...
متن کاملCluster Based Security Architecture in Wireless Ad-hoc Networks: an Overview
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. Providing security and anonymity to users are critical in wireless ad hoc networks. Ad hoc networks have lots of applications; however, a vita...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Computer
دوره 49 شماره
صفحات -
تاریخ انتشار 2016