Title :
Identifying and quantifying the android device users´ security risk exposure
Author :
Jeter, L. ; Mishra, Shivakant
Author_Institution :
Dept. of Comput. Sci., Univ. of Colorado, Boulder, CO, USA
Abstract :
The Android operating system has been designed to afford secure but unrestricted use of smartphones for the users. The crux of this solution is that the burden of system administration has been, possibly unknowingly, placed upon each individual user. As a result, an understanding of user behavior in terms of what security settings they typically use, what applications they download and what permissions they grant to these applications is critical to evaluate the security risk exposure of Android users. This paper presents an analysis of security-related user behavior data collected from over 375 distinct users over a period of four months. Based on this collected data, the paper identifies the significant threats Android users are faced with and recommends possible solutions. Combined with additional literary and product research, the paper identifies multiple shortcomings in the existing Android security landscape.
Keywords :
operating systems (computers); security of data; smart phones; Android device user; Android operating system; security risk exposure; security setting; security-related user behavior; smartphones; Androids; Bluetooth; Humanoid robots; IEEE 802.11 Standards; Operating systems; Security; Smart phones;
Conference_Titel :
Computing, Networking and Communications (ICNC), 2013 International Conference on
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4673-5287-1
Electronic_ISBN :
978-1-4673-5286-4
DOI :
10.1109/ICCNC.2013.6504045