• DocumentCode
    2673597
  • Title

    Various approaches in analyzing Android applications with its permission-based security models

  • Author

    Rassameeroj, Ittipon ; Tanahashi, Yuzuru

  • Author_Institution
    Dept. of Comput. Sci., Univ. of California, Davis, CA, USA
  • fYear
    2011
  • fDate
    15-17 May 2011
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Permission-based security models use a computer security technique that allows the administrator and operating system to restrict applications to access specific resources. The restrictions used in this model are not designed by the users, but instead are designed by developers or administrators. Therefore, the user´s system security is dependent on the user´s belief that the developers and administrators are legitimate, which can be easily exploited by malicious developers. In this paper, we perform a high-level contextual analysis and an exploration of Android applications based on their implementation of permission-based security models by applying network visualization techniques and clustering algorithms. Throughout the analysis, we discover several phenomena that verify past research, and new potentials in permission-based security models that may provide additional security to the users.
  • Keywords
    computer network security; operating system kernels; pattern clustering; Android applications; clustering algorithms; computer security technique; high-level contextual analysis; malicious developers; network visualization techniques; operating system; permission based security model; Androids; Computational modeling; Data visualization; Humanoid robots; Security; Smart phones; Visualization; Android applications; permission-based security; smartphone operating system;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electro/Information Technology (EIT), 2011 IEEE International Conference on
  • Conference_Location
    Mankato, MN
  • ISSN
    2154-0357
  • Print_ISBN
    978-1-61284-465-7
  • Type

    conf

  • DOI
    10.1109/EIT.2011.5978583
  • Filename
    5978583