DocumentCode
2673597
Title
Various approaches in analyzing Android applications with its permission-based security models
Author
Rassameeroj, Ittipon ; Tanahashi, Yuzuru
Author_Institution
Dept. of Comput. Sci., Univ. of California, Davis, CA, USA
fYear
2011
fDate
15-17 May 2011
Firstpage
1
Lastpage
6
Abstract
Permission-based security models use a computer security technique that allows the administrator and operating system to restrict applications to access specific resources. The restrictions used in this model are not designed by the users, but instead are designed by developers or administrators. Therefore, the user´s system security is dependent on the user´s belief that the developers and administrators are legitimate, which can be easily exploited by malicious developers. In this paper, we perform a high-level contextual analysis and an exploration of Android applications based on their implementation of permission-based security models by applying network visualization techniques and clustering algorithms. Throughout the analysis, we discover several phenomena that verify past research, and new potentials in permission-based security models that may provide additional security to the users.
Keywords
computer network security; operating system kernels; pattern clustering; Android applications; clustering algorithms; computer security technique; high-level contextual analysis; malicious developers; network visualization techniques; operating system; permission based security model; Androids; Computational modeling; Data visualization; Humanoid robots; Security; Smart phones; Visualization; Android applications; permission-based security; smartphone operating system;
fLanguage
English
Publisher
ieee
Conference_Titel
Electro/Information Technology (EIT), 2011 IEEE International Conference on
Conference_Location
Mankato, MN
ISSN
2154-0357
Print_ISBN
978-1-61284-465-7
Type
conf
DOI
10.1109/EIT.2011.5978583
Filename
5978583
Link To Document