Skip to main content

System-Level Permission Management Mechanism of Android Device

  • Conference paper
Applications and Techniques in Information Security (ATIS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 490))

  • 1571 Accesses

Abstract

As the existing Android operating system doesn’t grant users the permission to manage system hardware. A system-level permission management mechanism of android device is proposed to solve this problem. This mechanism is based on the existing system. The existing Android system framework layer and application layer are modified and extended by using  a control terminal application to control hardware and authorization, the system boot process, SystemProperty and Camera class to implement new system-level permission management mechanism of Android device. Via the mechanism, the security of Android system is improved, a new layer of protection is increased, the control function of hardware resource access is attached, and security threat for the platform is reduced from the system level. Experimental results show that the feasibility of this system privilege management mechanism is high.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bao, K.-j., Peng, Z.: An Extended Android Application Permission Management Model. Computer Enginieering 18, 15 (2012)

    Google Scholar 

  2. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235–245. ACM Press, USA (2009)

    Google Scholar 

  3. Nauman, M., Khan, S., Zhang, X.: Apex:Extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on information, Computer and Communications Security, pp. 328–332. ACM, USA (2010)

    Google Scholar 

  4. Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detectionof Malicious Applications on Android OS. In: Proceeding of the 4th International Conference onComputational Forensics (2011)

    Chapter  Google Scholar 

  5. Nauman, M., Khan, S., Zhang, X.: Apex: Extending AndroidPermission Model and Enforcement with User-Defined Runtime Constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS (2010)

    Google Scholar 

  6. Han, K.S., Lee, Y., Jiang, B., GyuIm, E.: Android Permission System Violation: Case Study and Refinemen. International Journal of E-Entrepreneurship and Innovation (IJEEI) 4(1), 16–27 (2013)

    Article  Google Scholar 

  7. Banuri, H., Alam, M., Khan, S., Manzoor, J., Ali, B., Khan, Y., Yaseen, M., Tahir, M.N., Ali, T., Alam, Q., Zhang, X.: An Android runtime security policy enforcement framework. Personal and Ubiquitous Computing 16 (2012)

    Google Scholar 

  8. Fang, Z., Han, W., Li, Y.: Permission based Android security: Issues and countermeasures. Computers & Security (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, D., Fan, Z., Pang, N. (2014). System-Level Permission Management Mechanism of Android Device. In: Batten, L., Li, G., Niu, W., Warren, M. (eds) Applications and Techniques in Information Security. ATIS 2014. Communications in Computer and Information Science, vol 490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45670-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45670-5_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45669-9

  • Online ISBN: 978-3-662-45670-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics