Securing Mobile Applications

نویسنده

  • Elisa Bertino
چکیده

W idespread mobile device use has stimulated a rich market for applications. Many apps, however, reveal sensitive user information such as location, movements, and habits1 and/or spread malware.2 Network anonymization techniques alone don’t ensure privacy because the OS together with the invoked mobile apps might still release information that reidentifies users or devices. Even when users are careful not to provide identifying data to smartphone apps over anonymous connections, the apps can leak such information without user knowledge. Thus, we must devise accurate methods of checking apps for the presence of malware and spyware. Although third-party application markets exist, most users download apps from well-known markets such as Google Play, Amazon Appstore, iTunes App Store, and Windows Store. The availability and widespread use of these markets might allow centralized deployment of techniques that identify potentially malicious apps. Uncovering potentially malicious apps isn’t a trivial task. Proposed approaches typically differ in the features they use to identify such apps, their use of machine-learning techniques, and their accuracy. In their 2015 IEEE Transactions on Dependable and Secure Computing article, Lei Cen and his colleagues proposed a highly accurate model for detecting malware in Android apps.3 The authors observed that application markets distribute apps in a form that allows easy decompilation and thus analysis. Moreover, they noted that mobile platforms provide semantically rich APIs. Drawing on these two observations, the authors devised a discriminative probabilistic learning model, based on regularized logistic regression, that detects malware by using apps’ decompiled code and information about required permissions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Applicability of Quantum Cryptography for Securing Mobile Communication Networks

After 20 years of basic research, quantum cryptography has meanwhile led to first commercial products. Its progress has triggered high publicity and additional R&D funding. The aim of this paper is to evaluate the status of quantum cryptography regarding its practical applicability for securing (mobile) communication networks. With that aim in mind, the paper presents a survey of the state-of-t...

متن کامل

Protecting Applications and Devices in Nomadic Business Environments

This paper presents a pragmatic approach to protect the integrity of execution of an application in a nomadic business environment. Applications run in such contexts are based on the federation of appliances collaborating through direct communication as well as through the distribution of mobile pieces of code. Securing the operation of an application means protecting mobile code since executio...

متن کامل

Securing Collaborative Applications

Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any time and from any location. Increasingly capable mobile platforms and rich, new applications are enabling users to communicate and collaborate anytime and anywhere. However, concerns about the security and reliability o...

متن کامل

Securing dynamic itineraries for mobile agent applications

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...

متن کامل

Cluster Based Security Architecture in Wireless Ad-hoc Networks: an Overview

Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. Providing security and anonymity to users are critical in wireless ad hoc networks. Ad hoc networks have lots of applications; however, a vita...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Computer

دوره 49  شماره 

صفحات  -

تاریخ انتشار 2016