Skip to main content

Survey on Android Applications Security

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9567))

Included in the following conference series:

  • 1622 Accesses

Abstract

Android plays a paramount role in mobile internet era and it is an extremely comfortable operating system to deploy in mobile devices. More and more security problems have been taken place on Android devices, and lead to leak users’ privilege information. In order to survey the security situation of Android application, we have downloaded 1901 Android APK files from the application market for study. We present several schemas to protect Android applications and avoid others to invade smartphones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vidas, T., Christin, N., Cranor, L.: Curbing Android permission creep. In: Proceedings of the Web 2.0 Security and Privacy 2011 Workshop, W2SP 2011, Oakland, CA (2011)

    Google Scholar 

  2. Hoffmann, J., Ussath, M., Holz, T., Spreitzenbarth, M.: Slicing droids: program slicing for smali code. In: Proceedings of the 28th Annual ACM Symposium on Applied Computting, pp. 1844–1851. ACM, New York (2013)

    Google Scholar 

  3. Gunasekera, S.A.: Android Apps Security. Apress, Berkeley (2012)

    Book  Google Scholar 

  4. Bovet, D., Cesati, M.: Understanding the Linux kernel. O’Reilly Media, Sebastopol (2005)

    Google Scholar 

  5. Ehringer D.: The dalvik virtual machine architecture. Technical report, Google (2010)

    Google Scholar 

  6. AppChina Market. http://www.appchina.com

  7. Winsniewski, R.: Android apktool: A Tool for Reverse Engineering Android apk Files. http://ibotpeaches.github.io/Apktool

  8. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the USENIX (2011)

    Google Scholar 

  9. Bartel, A., Klein, J., Le Traon, Y., Monperrus, M.: Dexpler: converting android dalvik bytecode to jimple for static analysis with soot. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis, SOAP 2012, pp. 27–38. ACM, New York (2012)

    Google Scholar 

  10. Gabor, P.: Dalvik opcodes. http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html

  11. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 5–44 (2010)

    Article  Google Scholar 

  12. Liu, N.S., Guo, D.H., Huang, J.X.: AES algorithm implemented for PDA secure communication with Java. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification, pp. 217–222. IEEE, New York (2007)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the National Nature Science Foundation of China (Grant No: 61272067, No: 61502180), the National High Technology Research and Development Program of China (863 Program, Grant No: 2013AA01A212), the Science and Technology Program of Guangzhou, China (Grant No: 2014J4300033), and the National Key Technology Support Program of China (Grant No: 2012BAH27F05).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Fu, C., Huang, C., Tang, Y., Zeng, W., Wang, D., Yuan, C. (2016). Survey on Android Applications Security. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31854-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31853-0

  • Online ISBN: 978-3-319-31854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics