Prevention of Interapp Permission Leakage for Android Applications

نویسنده

  • Gayathri S
چکیده

Each and every application in android requires respective user approval for providing permission to app to install. Suppose each and every one the consents are accepted the application is installed and takes delivery of the assemblage association. Throughout runtime, the permissions are checkered by the collection association. The gone astray permissions will grounds the request to smash into and as well it appropriates the respective user individual information from the server. Numerous methods were urbanized to become aware of the second-hand and idle permissions. Other than they did not catalog out the idle permissions. Many android applications like appwrong were able to exchange a few words with peripheral servers because it is arranged the internet permission. Furthermore, appwrong had confirmed permission for the camera smooth though it is not using any code related to the camera. For the reason that of this permission, the aggressor can inscribe the code for using camera,then it will obtain image and propel that to a distant congregation in the Internet. Therefore, this paper recommends a new-fangled procedure to register out the unexploited permissions using the compositional investigation and describe chart cohort. In wrapping up, the idle permissions will be detached and the app will be mounting into the corresponding device. Keyword Verification, App Usage, User Permission, Android, Vulnerabilities, Inter-App Permissions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malicious Behavior Monitoring for Android Applications

Android, as a modern popular open source mobile platform, makes its security issues more prominent, especially in user privacy leakage. In this paper, we proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, permission combination matrix is used to determine whether an application has potential risks. For those suspicious applications, based...

متن کامل

A Permission-Dependent Type System for Secure Information Flow Analysis

We introduce a novel type system for enforcing secure information flow in an imperative language. Our work is motivated by the problem of statically checking potential information leakage in Android applications. To this end, we design a lightweight type system featuring Android permission model, where the permissions are statically assigned to applications and are used to enforce access contro...

متن کامل

Permission based Android security: Issues and countermeasures

Android security has been a hot spot recently in both academic research and public concerns due to numerous instances of security attacks and privacy leakage on Android platform. Android security has been built upon a permission based mechanism which restricts accesses of third-party Android applications to critical resources on an Android device. Such permission based mechanism is widely criti...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

A Contextually-Aware, Privacy-Preserving Android Permission Model

Smartphones contain a large amount of highly personal data, much of it accessible to third-party applications. Much of this information is safeguarded by a permission model, which regulates access to this information. This work primarily focuses on improving the Android permission model, which is known to have notoriously large amounts of sensitive data leakage, but many of its findings can be ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016