Abstract
Nowadays, the smartphone has become the critical issue of users information security. The smartphone services not only principal functions of a cellular phone but also personalized functions such as mobile banking and GPS location tracking. It means that an attacker will be able to obtain a variety of personal information when an attacker compromises the smartphone. For this reason, malwares target environments have been changed to the smartphone platforms from computers. The android OS has the permission mechanism that was designed to prevent malicious behaviors of installed applications. However most of the users are not concerned about permissions of application to install. Thus, the android OS needs an advanced security mechanism that will be able to warn malicious behaviors of installed applications to the user. In this paper, we proposed permission-based application monitoring model, which is performed at the Android OS-level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Android Developers, http://developer.android.com/sdk/index.html
Android Official Blog. Google Play hits 25 billion downloads, http://officialandroid.blogspot.kr/2012/09/google-play-hits-25-billion-downloads.html
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. In: The 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3–14. ACM, New York (2011)
Symantec, A-Z listing of threats & risks, http://www.symantec.com/security_respo-nse/landing/azlisting.jsp?inid=us_sr_flyout_reporting_allthreats
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wanger, D.: Android Permissions: User Attention, Comprehension, and Behavior. In: The Eighth Symposium on Usable Privacy and Security, Article No. 3. ACM, New York (2012)
Android Developers, Permissions, http://developer.android.com/guide/topics/secur-ity/permissions.html
Symantec, AndroidOS.FakePlayer, http://www.symantec.com/security_response/w-riteup.jsp?docid=2010-081100-1646-99
Polla, M.L., Martinelli, F., Sgandurra, D.: A survey on Security for Mobile devices. IEEE Communications Surveys & Tutorials 15(1), 446–471
Symantec, Android.Beaglespy, http://www.symantec.com/security_response/write-up.jsp?docid=2012-091010-0627-99
Symantec, Android.Ecardgrabber, http://www.symantec.com/security_response/-writeup.jsp?docid=2012-062215-0939-99
Bose, A.: Hu. X., Shin, K.G., Park, T.: Behavioral Detection of Malware on Mobile Handsets. In: The 6th International Conference on Mobile Systems, Applications, and Services, pp. 225–238. ACM, New York (2008)
Felt, A.P., Chin, E., Hanna, S., Song, D., Wanger, D.: Android Permissions Demystified. In: The 18th ACM Conference on Computer and Communications Security, pp. 627–638. ACM, New York (2011)
Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security and Privacy 7(1), 50–57 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, MW., Choi, YH., Eom, JH., Chung, TM. (2013). The Permission-Based Malicious Behaviors Monitoring Model for the Android OS. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2013. ICCSA 2013. Lecture Notes in Computer Science, vol 7971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39637-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-39637-3_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39636-6
Online ISBN: 978-3-642-39637-3
eBook Packages: Computer ScienceComputer Science (R0)