Abstract
Android plays a paramount role in mobile internet era and it is an extremely comfortable operating system to deploy in mobile devices. More and more security problems have been taken place on Android devices, and lead to leak users’ privilege information. In order to survey the security situation of Android application, we have downloaded 1901 Android APK files from the application market for study. We present several schemas to protect Android applications and avoid others to invade smartphones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Vidas, T., Christin, N., Cranor, L.: Curbing Android permission creep. In: Proceedings of the Web 2.0 Security and Privacy 2011 Workshop, W2SP 2011, Oakland, CA (2011)
Hoffmann, J., Ussath, M., Holz, T., Spreitzenbarth, M.: Slicing droids: program slicing for smali code. In: Proceedings of the 28th Annual ACM Symposium on Applied Computting, pp. 1844–1851. ACM, New York (2013)
Gunasekera, S.A.: Android Apps Security. Apress, Berkeley (2012)
Bovet, D., Cesati, M.: Understanding the Linux kernel. O’Reilly Media, Sebastopol (2005)
Ehringer D.: The dalvik virtual machine architecture. Technical report, Google (2010)
AppChina Market. http://www.appchina.com
Winsniewski, R.: Android apktool: A Tool for Reverse Engineering Android apk Files. http://ibotpeaches.github.io/Apktool
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the USENIX (2011)
Bartel, A., Klein, J., Le Traon, Y., Monperrus, M.: Dexpler: converting android dalvik bytecode to jimple for static analysis with soot. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis, SOAP 2012, pp. 27–38. ACM, New York (2012)
Gabor, P.: Dalvik opcodes. http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 5–44 (2010)
Liu, N.S., Guo, D.H., Huang, J.X.: AES algorithm implemented for PDA secure communication with Java. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification, pp. 217–222. IEEE, New York (2007)
Acknowledgment
This work is supported by the National Nature Science Foundation of China (Grant No: 61272067, No: 61502180), the National High Technology Research and Development Program of China (863 Program, Grant No: 2013AA01A212), the Science and Technology Program of Guangzhou, China (Grant No: 2014J4300033), and the National Key Technology Support Program of China (Grant No: 2012BAH27F05).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Fu, C., Huang, C., Tang, Y., Zeng, W., Wang, D., Yuan, C. (2016). Survey on Android Applications Security. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-31854-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31853-0
Online ISBN: 978-3-319-31854-7
eBook Packages: Computer ScienceComputer Science (R0)