Abstract
As the existing Android operating system doesn’t grant users the permission to manage system hardware. A system-level permission management mechanism of android device is proposed to solve this problem. This mechanism is based on the existing system. The existing Android system framework layer and application layer are modified and extended by using a control terminal application to control hardware and authorization, the system boot process, SystemProperty and Camera class to implement new system-level permission management mechanism of Android device. Via the mechanism, the security of Android system is improved, a new layer of protection is increased, the control function of hardware resource access is attached, and security threat for the platform is reduced from the system level. Experimental results show that the feasibility of this system privilege management mechanism is high.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bao, K.-j., Peng, Z.: An Extended Android Application Permission Management Model. Computer Enginieering 18, 15 (2012)
Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235–245. ACM Press, USA (2009)
Nauman, M., Khan, S., Zhang, X.: Apex:Extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on information, Computer and Communications Security, pp. 328–332. ACM, USA (2010)
Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detectionof Malicious Applications on Android OS. In: Proceeding of the 4th International Conference onComputational Forensics (2011)
Nauman, M., Khan, S., Zhang, X.: Apex: Extending AndroidPermission Model and Enforcement with User-Defined Runtime Constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS (2010)
Han, K.S., Lee, Y., Jiang, B., GyuIm, E.: Android Permission System Violation: Case Study and Refinemen. International Journal of E-Entrepreneurship and Innovation (IJEEI) 4(1), 16–27 (2013)
Banuri, H., Alam, M., Khan, S., Manzoor, J., Ali, B., Khan, Y., Yaseen, M., Tahir, M.N., Ali, T., Alam, Q., Zhang, X.: An Android runtime security policy enforcement framework. Personal and Ubiquitous Computing 16 (2012)
Fang, Z., Han, W., Li, Y.: Permission based Android security: Issues and countermeasures. Computers & Security (2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, D., Fan, Z., Pang, N. (2014). System-Level Permission Management Mechanism of Android Device. In: Batten, L., Li, G., Niu, W., Warren, M. (eds) Applications and Techniques in Information Security. ATIS 2014. Communications in Computer and Information Science, vol 490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45670-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-662-45670-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45669-9
Online ISBN: 978-3-662-45670-5
eBook Packages: Computer ScienceComputer Science (R0)