Android And Smartphone Security Research Paper

PAGES
8
WORDS
2544
Cite

Review on Android and Smartphone Security
Abstract

Currently, Android controls the largest market share among operating systems for smartphones. Smartphone users have woken up to the realization that security is an issue that must be kept in mind all the time. The enhancement of performance and increase in features also multiply in tandem with risk such as virus attacks. It is possible that Android could be the most secure operating system, compared to others, currently. There are limited restrictions for developers, however. Such a blank check allows for multiple security concerns for the end-user. This paper explores Android's security model; it is the level of application and the security concerns with the operating system for smartphones.

There is no doubt that Android has exhibited truly modern smartphone features and tweaks. It is a typical open-source program. Applications from Android can use a broad range of software programs, including server and local data, networks, and other applications (Mohini, et al., 2013). To successfully run an open-source platform such as Android, one needs a highly sophisticated and anticipative approach and infrastructure. Android Operating System works with multi-layers of security precautions. It is an ideal platform for an open-source channel. Android incorporates a stack of software, with an Operating System, core application, and middleware in complete form (Kaur & Kaur, 2013).

Millions of mobile gadgets in over 190 countries across the globe use the Android Operating System. Android has been designed with architectural acumen that gives room for continuous improvement from developers from elsewhere. Indeed, the security elements have been designed to remain accommodative to developers. The developers have the window to use the versatile security buffers. There is a lack of familiarity by developers about security that applies by default. The end user's interest drives the design of the Android Operating System and the device itself. It allows users to view how applications work and manage the same applications (Mohini, et al., 2013).

Figure 1 below compiles the security aspects of Android, including what is considered at various levels. Every element assumes that the one below it is appropriately secured. If an Android OS code running as root, with the exception, any process running over the Kernel for Linux is controlled by the Application Sandbox (Mohini, et al., 2013)

Figure 1: Architecture of Android (Mohini, et al., 2013)

Android Security

i. Android is open source, thus, allows developers to enhance it (AOSP, 2013)

ii. The software for Android is for multitasking. Consequently, no software can gain serious access to OS components (AOSP, 2013)

iii. So far, UNIX is the most secure Operating System, and it is what Android uses (AOSP, 2013)

iv. If a developer wishes to publish their application on the open market, they require a unique signature to do so (AOSP, 2013).

v. iv. The developers need a unique signature to publish their application on the market (AOSP, 2013).

vi. Users have an avenue to report suspected security flaws through their Google accounts

vii. For application installation, all must seek clearance from the end-user

Security Concerns that Android Has Faced

Well, Android is not as secure as it appears, the layers of security measures notwithstanding. Some security concerns are apparent:

i. There is no security scan for Android for applications being uploaded on its customer stalls

ii. Some apps have been noted to carry the capacity to exploit the services of other apps installed on the Android system with no prior permission granted

iii. Android's permission security model offers the user the power to decide whether an app is trustworthy or not. The latter model opens many worms because there will be lapses with lay security checks by end-users.

iv. While the open-source is available for trustworthy developers, hackers can access it just as well and easily. Consequently, Android renders itself illegitimate when one wishes to install critical systems.

v. Lastly, the Android system developers give a disclaimer that they cannot be held responsible for security lapses emanating from external storage. In other words, any app on the device can access the data on other apps and the device data in a similar fashion as GSM and IDs for SIM marketers with no permission from the end-user (Mohini, et al., 2013)

Applications function as processes for Linux using their IDs. Therefore they are separated. This means that the vulnerability of one App should not necessarily affect another. Because Android offers IPC mechanisms, which must be secured, there is a second line of enforcement that materializes. Android uses a monitor for reference used to mediate access to the components of applications anchored on user permissions. If an app attempts to access a different component, it must be cleared by the end-user through the end-user permission security gateway. Such permissions must be granted at the time of installation (AOSP, 2013).

Requests for...…that are driven (Mohini, et al., 2013).

MADAM framework

This framework facilitates the detection of intrusion early. It tracks the malicious activity of malware on the Android platform. The MADAM framework strategy exploits a multilevel methodology, i.e., combining the features at kernel-level and the level at which it is applied. Machine learning techniques drive it. Thus, the initial prototype for Android Smartphone has detected all the 10 real malware that was monitored. It has an effect on the experience of the user owing to the few false generated every day. To our knowledge, the results are a clear improvement to the solutions generated in the previous work; both for enhancing the rate of detection of real malware on android smartphones and also false-positive occurrences (Dini, Martinelli,Saracino&Sgandurra, 2012).

Conclusions

Billions of people are now using smartphones. This means that its usage is growing, and so it is not easy to validate if an application is legitimate or malicious. Therefore, the user must choose whether it is safe to use the application. Note that there are different types of PCs and mobile devices in the resource management mechanism, so not all solutions could be compatible with all the devices (Ahmed & Sallow, 2019). As a result, academic research and anti-malware organizations have many security methods that could help recognize and classify threats that may affect the Android operating system. Going by this proposal, methods differ and could be arranged into several classifications. This is why this paper has looked at many security methods and threats and possible solutions classification.

Note that more than a million Android devices are activated (Mohini, et al., 2013). This is because there are fewer restrictions for the developer, which increases the risk to end-users. This paper has therefore reviewed security issues in Android smartphone OS. Thus integrating technologies in the application certification process may need that you overcome technical and logical challenges. Android avails more security than any other platform could provide. Kirin is working hard to transform Android into an OS that is secure than other platforms for computing platforms for the next generation.

Other than expanding Android smartphones, the number of malware, and the quantity of Android applications, continues to grow every day. However, the malware still exploits the existing security system weakness to access the resources. Therefore, several proposals have been presented to help prevent and control vulnerabilities in the Android platform.

Bibliography

Ahmed, O.…

Sources Used in Documents:

Bibliography

Ahmed, O. & Sallow, A. B., 2019. Android Security: A Review. Academic Journal of Nawroz University.

Android Open Source Project. 2013. Android Security Overview. http://source.android.com/devices/tech/security/index.html.

Android Open Source Project. Security and permissions. 2013. http://developer.android.com/guide/topics/security/permissions.html.

Android Open Source Project. 2013. Publishing on GooglePlay. http://developer.android.com/distribute/googleplay/publish/preparing.html.

Android Open Source Project. 2013. What is Android? http://developer.android.com/about/index.html

Berger B.J., Bunke M., and Sohr K., 2011. An Android Security Case Study with Bauhaus, Working Conference on Reverse Engineering, 179–183.

Dini G., Martinelli F., Saracino A. and Sgandurra D., 2012. MADAM: a multi-level anomaly detector for android malware, http://www.iet.unipi.it/g.dini/research/papers/2012-MMMANCS.pdf

Enck W., Octeau D., McDaniel P., and Chaudhuri S., 2011. A Study of Android Application Security, The 20th USENIX Conference on Security, 21-21.

Schmidt A.D., Schmidt H.G., Clausen J., Camtepe A., Albayrak S., and Yuksel K. Ali and Kiraz O., 2008. Enhancing Security of Linux-based Android Devices, http://www.dailabor.de/fileadmin/files/publications/lk2008-android_security. pdf


Cite this Document:

"Android And Smartphone Security" (2020, November 21) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/android-smartphone-security-research-paper-2175793

"Android And Smartphone Security" 21 November 2020. Web.19 April. 2024. <
https://www.paperdue.com/essay/android-smartphone-security-research-paper-2175793>

"Android And Smartphone Security", 21 November 2020, Accessed.19 April. 2024,
https://www.paperdue.com/essay/android-smartphone-security-research-paper-2175793

Related Documents

Androids From your reading of Hasker, and using the categories he uses, what view of the mind/body problem do you think is exhibited by Picard? By Maddox? Support your answer. When explaining the mind/body problem, Hasker points out that there are physical properties and mental properties of people that can enhance understanding of the Star Trek episode. Hasker also notes that the philosophical concept of dualism (between mind and body) and the

But Android is also available on low-end devices. This is a market unserved by either Apple or Blackberry. The low-end market is especially popular in the developing world -- consider that India now has an Android tablet priced at $60. By virtue of covering all price ranges in the market, Android is poised to take a dominant share of smartphones. In addition, the differentiation that its manufacturers are engaging

Android Tablet
PAGES 2 WORDS 546

Android Tablet General Marketing The objective of this study is to describe the cultural, social, personal and psychological factors that influence consumers on purchasing an Android Tablet. This work will also discuss which aspects of consumer behavior the product or service should emphasize in their marketing plan and why. Personal Use The personal reason to purchase an Android Tablet may include the ability to read E-books using the Android Tablet or the ability to

Smartphones and the Great Digital Divide Even though 44% of African-Americans and Latinos own a smartphone while only 30% of White, non-Hispanics do, many people contend that this isn't really closing the great digital divide because African-Americans and Latinos use their smartphones more for entertainment than empowerment. Build an argument to support the previous statement. One can in fact argue that while more minority persons own a smartphone than Caucasian individuals, one

NFC is going to revolutionize the smartphone as an e-commerce platform. Conclusion The proliferation of smartphones continues to lead to exceptional growth of application development across all platforms, with Android being the clear leader in the last six months of development. The decision to make the platform and source code both open have contributed to Google quickly overtaking Apple and their iPhone OS operating system in terms of market share. It

This section of the paper is providing the disadvantages of smart phones and tablets technology for the employees working in private and government organizations. a. Cost Undoubtedly, the biggest disadvantage of smart phones and tablets technology is the cost as compared to the standard mobile phones. Since, it has been examined that the cost of smart phones is more upfront as compared to the less than about a third of such