Android Application Permission Manager

Slides:



Advertisements
Similar presentations
City of Boroondara Mobile Device Management
Advertisements

A Comprehensive Study for RFID Malwares on Mobile Devices TBD.
Batch Name: EPGP-EG Course Name : IT Networking Case name: Google Android Group Number: 8 Group Members: 1) Ayan Mukherjee (EG ) 2) Kolhe.
I399 M OBILE C OMPUTING G ROUP Peyman, Adrian, John, Brad Mentors: Beenish, Santosh.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
William Enck, Machigar Ongtang, and Patrick McDaniel.
IOS & Android Security, Hacking and Tweaking Workshop D.Papamartzivanos University Of the Aegean – Info Sec Lab Android Security – Cydia Substrate Dimitris.
Catholic University College of Ghana Fiapre-Sunyani Catholic University College of Ghana Introduction to Information Technology I.
Presentation By Deepak Katta
Sophos Mobile Security
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Mobile Device Security Challenges  Mustaque Ahamad, Director, Georgia Tech Information Security Center  Patricia Titus, VP and Global Chief Information.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
A multi-Criteria-based Evaluation of Android Application Andrea Saracino, G. Dini, F. Martinelli, I. Matteucci, M.Petrocchi, D. Sgandurra InTrust 2012.
Leave Me Alone: App- level Protection Against Runtime Information Gathering on Android NAN ZHANG, KAN YUAN, MUHAMMAD NAVEED†, XIAOYONG ZHOU AND XIAOFENG.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Arpit Jain Mtech2. Outline Introduction Attacks Solution Experimental Evaluation References.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
Android and IOS Permissions Why are they here and what do they want from me?
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Literature by S. Demetriou et al. Presented.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology.
Windows Tutorial 5 Protecting Your Computer
BUILD SECURE PRODUCTS AND SERVICES
Android App Permission Manager
More Security and Programming Language Work on SmartPhones
Professor Tzong-Chen Wu
By: Abhilaash Velamati Intern at CGH Technologies
TriggerScope: Towards Detecting Logic Bombs in Android Applications
Android Access Control
Android System Security
World-Leading Research with Real-World Impact!
Trends in my profession, Information Technology
Cloud Security Research Based On The Internet of Things
Advanced features iNaturalist
Technical Steps to Install Norton Mobile Security on Android Phone.
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
Physical activities and activity tracker
Pradeo Security Systems
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Android Mobile apps development services company in India
Call AVG Antivirus Support | Fix Your PC
Technology, Issues, and Solutions by David Clark
Analyzing WebView Vulnerabilities in Android Applications
University of California, Santa Barbara
CSCD 330 Network Programming Spring
Catholic University College of Ghana Fiapre-Sunyani
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
Catholic University College of Ghana Fiapre-Sunyani
Unit 36: Internet Server Management
“Location Privacy Protection for Smartphone Users”
“A 21st century pen pal system.”
Mobile App Advertisements
CSCD 330 Network Programming Spring
The MobileIron® Threat Detection difference:
CSC 581: Mobile App Development
Kronos Mobile User Guide – CST Drivers
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
Chapter 10. Mobile Device Security
Android Access Control
Presentation transcript:

Android Application Permission Manager Protecting users from malicious apps Katherine Schwartz

Concepts Android permissions allow an app access to information and systems on the phone, with the user’s consent. Some permissions are dangerous, allowing an app to access personal information about the user Malware and advertisements included in apps can take advantage of permissions to gain access to phone systems and the user’s information.

Previous Work The method used to determine which apps are dangerous has been determined. The aspects focus on include: Permissions not required for app functions Dangerous combinations of permissions Range of app permissions used by each app category Possible privacy threats each app can expose users to Ad networks associated with apps in Google Play The basic AAPM Framework is nearly complete Main functionality already implemented Final features will be completed shortly

Work Required Finalize AAPM framework Testing and tweaking of AAPM Find apps on which to test framework Test framework on known apps to make sure it functions correctly Write journal paper for publication in IEEE Transactions

Current Work Creation of a list of Google Play apps associated with adware or malware The master list currently contains 178 entries, while my personal list contains 58 entries

What’s Next Identification of app networks utilized on the adware-associated apps Testing of the AAPM Framework on the apps we have identified

References N. Okazaki, Y. Kita, K. Aburada and M. Park, "Security Evaluation System for Android Applications Using User's Reviews and Permissions", Journal of Robotics, Networking and Artificial Life, vol. 2, no. 3, p. 190, 2015. P. Faruki et al., "Android Security: A Survey of Issues, Malware Penetration, and Defenses," in IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 998-1022, Secondquarter 2015. M. La Polla, F. Martinelli and D. Sgandurra, "A Survey on Security for Mobile Devices," in IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 446- 471, First Quarter 2013.