National Conference on Recent Trends in Computer Science and Engineering |
Foundation of Computer Science USA |
MEDHA2015 - Number 2 |
June 2015 |
Authors: Gajanan V. Jaybhaye, Pushpanjali M. Chouragade |
34dd0d4a-fa9f-4339-b0ac-404b0e8bf206 |
Gajanan V. Jaybhaye, Pushpanjali M. Chouragade . Analysis of Android Security with the Help of Component Granting Permission. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 2 (June 2015), 1-3.
Nowadays, the mobile has operating system for which we required security. It works like operating system of personal computer, generally mobile uses android base operating sytem. will granting a permission break the phone's security? Do the access permission assignments to an application's components put the phone or the application at risk? Android currently provides no means of answering these questions. We developed an enhanced installer and security framework to answer a variant of these questions—namely," does an application break some larger phone-wide security policy?" Our tool, called Kirin extracts an application's security policy from its manifest file to determine if the requested permissions and component permission assignments are consistent with the stakeholders' definition of a secure phone. The existing reviews extensively cover the smart phone OS security. However, we believe that the security of Android, with particular focus on malware growth, study of anti-analysis technique and existing detection methodologies needs an extensive coverage.