Android Security AReview
Android Security AReview
net/publication/319388903
CITATIONS READS
11 131
2 authors:
All content following this page was uploaded by Omar Ahmed on 24 May 2020.
1Department of Computer Science, Faculty of Science, Zakho University, Duhok, Kurdistan Region – Iraq
2Department of Computer Science and Information Technology, College of Computer Science & Information
Technology, Nawroz University, Duhok, Iraq
ABSTRACT
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of
control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it
is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there
are differences between mobile devices and PC machines in resource management mechanism, the security solutions
for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and
academic researchers have produced and proposed many security methods and mechanisms in order to recognize
and classify the security threat of the Android operating system. By means of the proposed methods are different
from one to another, they can be arranged into various classifications. In this review paper, the present Android
security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions
and evaluate them.
KEYWORDS: Android, Security, Smartphone.
consists of the APIs, libraries, and middleware by writing components, the Android operating system is based,
in c programming language, and above the application which is organized by five major layers like appeared in
framework the application software is running which Figure 1. Android operating system and platform
contains other libraries which they are Java-compatible. components and layers are described and analyzed as
Like open source licenses by Google, the Android’s source Threats and Defenses of Android Security (Brähler, 2010).
code is published. By means of a stack of software
statistically implausible feature selection by means of for approval regarding the same.
similarity digest hashing mechanism. The proposed 3.6. FireDroid
solution efficiently detects code obfuscated malware, In (Russello, Jimenez, Naderi, & van der Mark, 2013) they
control flow obfuscation, method renaming, and junk propose FireDroid which is a framework that is policy-
method addition. Signature produced through the based by interleaving process system calls can
proposed method is sufficiently solid to detect unknown implementing security policies. In this method an
samples obfuscated with several code obfuscation application monitor is generated for tracking all
techniques which they are not detected by the common processes spawned in Android operating system and
Antivirus application. Manually analyzing the suspected based on humanly managed policies can accept or reject
samples detected by the method in which through them. At runtime, the FireDroid can identify if an app is
present Android malware signatures is verifying their executing illegitimate or potentially harmful actions by
similarity. This proposed signature method is strong in interrupting the system calls the app executes.
counter to repackaged apps. Regardless of if the malware is repackaged or a new type
3.3. Kirin of an existing one: FireDroid can detect and implement
In (Bahman Rashidi, Fung, & Vu, 2014) they proposed the proper security policies once the malware executes
Kirin method the main goal of this method is to harmful system calls.The objective of FireDroid is that it
qualifying malicious applications at install time utilizing is entirely transparent to the apps along with Android
certification process on applications. On app’s requested operating system. By this the users are not complicated
permissions this method uses a set of previously defined with a heavy interaction.
security rules for finding the matched permission 3.7. DroidScope
requests that are considered as a malicious. The defined In (Yan & Yin, 2012) they proposed DroidScope which is
rules are based on the sensitive permissions which lead a Virtual Machine Introspection (VMI) that is for
to abusing of dangerous activities and permissions. Android applications is dynamic analysis framework.
3.4. RecDroid Contrasting other dynamic analysis frameworks, it
In (B Rashidi, Fung, & Vu, 2014) they proposed the doesn't be located inside the emulator but creating
RecDroid method it is a framework through Dalvik-level and OS-level semantics by locating outside
crowdsourcing for resource accessing permission the emulator. By this, even in the kernel, the privilege
control. RecDroid tries to help users to choose the correct escalation attacks can be detected. It likewise makes the
choice to decide if a permission request ought to be attackers mission of disorderly analysis hard. upon
denied or accepted. RecDroid is an approval framework QEMU emulator the DroidScope is built, and likewise,
that brings together the user’s permission responses to make a set of APIs available to modify analysis needs to
the application’s permission requests, also for evaluating human analysts.
the level of experience of users this method is utilized 3.8. RiskMon
and to figure a proper response to the permission request In (Jing, Ahn, Zhao, & Hu, 2014) they propose the
even to be rejected or accepted. RecDroid depends on a RiskMon method which is integrated runtime behaviors
slight group of seed expert users that might generate and user’s expectations of authorized apps to produce a
dependable recommendations for a slight group of apps. risk assessment baseline in which can seizures suitable
To ignore malicious responses and detecting the behaviors of apps. User’s expectations on the apps are
malicious clients this method in addition utilizes a game- the key part of the operating system. Initially, the user’s
theoretic Bayesian. expectations of the deployed applications are gathered
3.5. Aurasium and the position of permission sets based on their
In (Xu, Saïdi, & Anderson, 2012) they proposed relevancy to the corresponding app. After that,
Aurasium technique which is a very useful technique depending on the gathered data from the user, it
that takes control of execution of applications, by forcing generates or produce the risk assessment baseline for the
arbitrary security rules at runtime. In order to have the apps. Lastly, utilizing the produced baseline, the method
ability to do that, Aurasium includes code for rules ranks deployed apps depending on the risk of the
enforcement to Android applications by repackages it. application’s interactions.
Aurasium can apply security rules across multiple 3.9. RiskRanker
applications not only at individual application. Any In (Grace, Zhou, Zhang, Zou, & Jiang, 2012) they propose
privacy and security violations are informed to the user. RiskRanker is a practical active procedure to recognize
So, it rejects the necessity of manipulating an Android zero-day Android malicious apps. It attempts to assess
operating system to monitor application behavior. It potential security risks caused by unauthorized
interferes when the application accessing sensitive data applications. They design an automated system with the
like phone identifiers, messages, contacts and purpose of analyzing the harmful behavior of
implementing shell-commands by requesting the user applications dynamically. The proposed method
4. Conclusion https://doi.org/10.1145/2046614.2046619
Alongside the expanding of Android smartphones, the Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M.
quantity of Android applications, as well as malware is S., Conti, M., & Rajarajan, M. (2015). Android security:
expanding daily. Regardless of existing Android security A survey of issues, malware penetration, and
system, malware exploits the existing security system’s defenses. IEEE Communications Surveys and Tutorials,
weakness to reach and access the granted resources. By 17(2), 998–1022.
this means, various solutions have been proposed in https://doi.org/10.1109/COMST.2014.2386139
order to control and prevent the vulnerabilities in Faruki, P., Ganmoor, V., Laxmi, V., Gaur, M. S., &
Android platform. In this review paper, the proposed Bharmal, A. (2013). AndroSimilar : Robust Statistical
solution is divided into two groups static and dynamic Feature Signature for Android Malware Detection.
and into three goals assessment, analysis, and detection. Proceedings of the 6th International Conference on Security
of Information and Networks, (September 2015), 152–159.
REFERENCES
https://doi.org/10.1145/2523514.2523539
Android. (2017). Android Security Overview. Retrieved
Grace, M., Zhou, Y., Zhang, Q., Zou, S., & Jiang, X. (2012).
from https://source.android.com/security/
RiskRanker: Scalable and Accurate Zero-day Android
Appbrain. (2017). Number of android applications.
Malware Detection. 10th International Conference on
Retrieved July 28, 2017, from
Mobile Systems, Applications, and Services, 281–294.
http://www.appbrain.com/stats/number-of-android-
https://doi.org/10.1145/2307636.2307663
apps
Jing, Y., Ahn, G.-J., Zhao, Z., & Hu, H. (2014). RiskMon :
Brähler, S. (2010). Analysis of the Android Architecture.
Continuous and Automated Risk Assessment of
Karlsruhe Institute for Technology, 52. Retrieved from
Mobile Applications. Proceedings of the 4th ACM
http://os.ibds.kit.edu/downloads/sa_2010_braehler
Conference on Data and Application Security and Privacy
-stefan_android-architecture.pdf
- CODASPY ’14, 99–110.
Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011).
https://doi.org/10.1145/2557547.2557549
Crowdroid: Behavior-Based Malware Detection
Rashidi, B., Fung, C., & Vu, T. (2014). On lightweight
System for Android. Proceedings of the 1st ACM
mobile phone application certification. Proceedings of
Workshop on Security and Privacy in Smartphones and
the ACM MobiCom Workshop on Security and Privacy in
Mobile Devices - SPSM ’11, 15.
Mobile Environments, 235–245.
https://doi.org/10.1145/1653662.1653691
Rashidi, B., Fung, C., & Vu, T. (2014). RecDroid: A resource
access permission control portal and recommendation
service for smartphone users. 2014 ACM MobiCom
Workshop on Security and Privacy in Mobile
Environments, SPME 2014, 13–17.
https://doi.org/10.1145/2646584.2646586
Russello, G., Jimenez, A. B., Naderi, H., & van der Mark,
W. (2013). FireDroid: hardening security in almost-
stock Android. Proceedings of the 29th Annual Computer
Security Applications Conference, 319–328.
https://doi.org/10.1145/2523649.2523678
Xu, R., Saïdi, H., & Anderson, R. (2012). Aurasium:
Practical Policy Enforcement for Android
Applications. Proceedings of the 21st USENIX
Conference, 27. Retrieved from
https://www.usenix.org/system/files/conference/
usenixsecurity12/sec12-
final60.pdf%5Cnhttp://dl.acm.org/citation.cfm?id=2
362793.2362820
Yan, L. K., & Yin, H. (2012). DroidScope: Seamlessly
Reconstructing the OS and Dalvik Semantic Views for
Dynamic Android Malware Analysis. In USENIX
Security Symposium.
https://doi.org/10.1145/2420950.2420980
Zhou, W., Zhou, Y., Jiang, X., & Ning, P. (2012). Detecting
repackaged smartphone applications in third-party
android marketplaces. Proceedings of the Second ACM
Conference on Data and Application Security and Privacy -
CODASKY ’12, 317–326.
https://doi.org/10.1145/2133601.2133640