Abstract
Trends in software distribution indicate a rapid change in an online application market. Current smartphones enable users to easily install various applications that are purchased from the online market using their phone. In addition, the openness of the Android system even allows users to choose from various online markets. Because such openness also invokes critical threats such as malware and illegal use, several online markets employ strong authentication techniques. However, such methods can also inconvenience valid users. In this paper, we discuss such problems and propose the concept of an authentication model that makes purchased applications available in most cases.















Similar content being viewed by others
Notes
http://www.palm.com It is currently redirected to HP Inc.
More information can be found here. http://msdn.microsoft.com/en-us/library/ms905511.aspx
References
Albano P, Castiglione A, Cattaneo G, De Santis A (2011) A novel anti-forensics technique for the android OS. BWCCA, pp 380–385
Backes M, Gerling S von Styp-Rekowsky P (2011) A novel attack against android phones. arXiv.org, vol. cs.CR. 21 Jun 2011
Cluley G (2012) Android malware poses as angry birds space game. NakedSecurity, SophosLab April 12, 2012
Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2010) Detection of malicious applications on android OS. ICWF, pp 138–149
Enck W, Octeau D, McDaniel P, Chaudhuri S (2011) A study of android application security. USENIX Security Symposium 2011
Rashid FY (2012) Black hat: Researchers find way to “bounce” malware into Google app store. SCMagazine, July 26, 2012
Zhou W, Zhou Y, Jiang X, Ning P (2012) Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY, pp 317–326
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2012R1A1A1010667).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Han, K., Shon, T. Authentication of mobile applications through various local distributors. Multimed Tools Appl 74, 1541–1555 (2015). https://doi.org/10.1007/s11042-013-1520-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1520-y