Security Controls for Android

被引:0
|
作者
Garcia Vargas, Ruben Jonathan [1 ]
Galeana Huerta, Ramon [1 ]
Aguirre Anaya, Eleazar [1 ]
Moreno Hernandez, Alba Felix [1 ]
机构
[1] IPN, SEPI ESIME Culhuacan, Mexico City 07738, DF, Mexico
关键词
Hardening; Android; Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the operating systems used by smartphones, Android has the most growing usage rate. Most recent Android versions have some security controls; however, there is a lack in the use of strong security controls for Android 2.3 (Gingerbread), which is the most spread version of this operating system. This leaves vulnerable company and user information stored in such devices. This work presents how to improve Android's security by adding more security controls to devices using the version 2.3 and by this way meet the security levels needed for the business and secure users environments. The security polices where added to Android's source code and to the data space.
引用
收藏
页码:212 / 216
页数:5
相关论文
共 50 条
  • [1] Security Objectives, Controls and Metrics Development for an Android Smartphone Application
    Savala, Reijo M.
    Kylanpaa, Markku
    [J]. 2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
  • [2] Understanding Android Security
    Robinson, Gregor
    Weir, George R. S.
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 189 - 199
  • [3] Security Smells in Android
    Ghafari, Mohammad
    Gadient, Pascal
    Nierstrasz, Oscar
    [J]. 2017 IEEE 17TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2017, : 121 - 130
  • [4] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [5] Understanding Android Security
    Enck, William
    Ongtang, Machigair
    McDaniel, Patrick
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 50 - 57
  • [6] The Perils of Android Security Configuration
    Vecchiato, Daniel
    Vieira, Marco
    Martins, Eliane
    [J]. COMPUTER, 2016, 49 (06) : 15 - 21
  • [7] Android Security Issues and Solutions
    Karthick, S.
    Binu, Sumitra
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 686 - 689
  • [8] Mobile Security: A Look into Android
    Mos, Aaron
    Chowdhury, Md Minhaz
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2020, : 638 - 642
  • [9] Monitoring Android Communications for Security
    Gomez-Hernandez, J. A.
    Garcia-Teodoro, P.
    Holgado-Terriza, J. A.
    Macia-Fernandez, G.
    Camacho-Paez, J.
    Noguera-Comino, J. M.
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [10] The Android Platform Security Model
    Mayrhofer, Rene
    Vander Stoep, Jeffrey
    Brubaker, Chad
    Kralevich, Nick
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (03)