Title :
Various approaches in analyzing Android applications with its permission-based security models
Author :
Rassameeroj, Ittipon ; Tanahashi, Yuzuru
Author_Institution :
Dept. of Comput. Sci., Univ. of California, Davis, CA, USA
Abstract :
Permission-based security models use a computer security technique that allows the administrator and operating system to restrict applications to access specific resources. The restrictions used in this model are not designed by the users, but instead are designed by developers or administrators. Therefore, the user´s system security is dependent on the user´s belief that the developers and administrators are legitimate, which can be easily exploited by malicious developers. In this paper, we perform a high-level contextual analysis and an exploration of Android applications based on their implementation of permission-based security models by applying network visualization techniques and clustering algorithms. Throughout the analysis, we discover several phenomena that verify past research, and new potentials in permission-based security models that may provide additional security to the users.
Keywords :
computer network security; operating system kernels; pattern clustering; Android applications; clustering algorithms; computer security technique; high-level contextual analysis; malicious developers; network visualization techniques; operating system; permission based security model; Androids; Computational modeling; Data visualization; Humanoid robots; Security; Smart phones; Visualization; Android applications; permission-based security; smartphone operating system;
Conference_Titel :
Electro/Information Technology (EIT), 2011 IEEE International Conference on
Conference_Location :
Mankato, MN
Print_ISBN :
978-1-61284-465-7
DOI :
10.1109/EIT.2011.5978583