SlideShare a Scribd company logo
Implementing Security on Android Application
Presented By
Prabhakar Jha(7cs39)
Contents
• INTRODUCTION
• OVERVIEW OF ANDROID
• REVIEW LITERATURE
• SECURITY IN ANDROID
• CONCLUSION
Introduction
• Android is Google’s new open-source platform
for mobile devices.
• It comes with an SDK that provides the tools and
APIs necessary to develop new applications for
the platform in Java.
• Android has its own virtual machine i.e. DVM
(Dalvik Virtual Machine), which is used for
executing the android applications.
• As Android provides remote access to official
sensitive data, which can lead to data hack if
smart phones are hacked .
Overview of Android
The application model
• An application is a package of components, each of
which can be instantiated and run as necessary .
• Activity components form the basis of the user
interface; usually, each window of the application is
controlled by some activity.
• Service components run in the background, and
remain active even if windows are switched.
• Receiver components react asynchronously to
messages from other applications.
• Provider components store data relevant to the
application, usually in a database. Such data can be
shared across applications.
Overview of Android
Security mechanisms
• It is possible for an application to share its data and
functionality across other applications, such
applications access its components.
• The key access control mechanisms provided by
Android.
• Isolation The Android operating system builds on a
Linux kernel, and as such, derives several protection
mechanisms from Linux. . Every application runs in its
own Linux process. Android starts the process when
any of the application’s code needs to be run, and
stops the process when another application’s code
needs to be run.
Overview of Android
Security mechanisms
• Permissions Any application needs explicit permissions
to access the components of other applications.
Crucially, such permissions are set at install time, not at
run time. The permissions required by an application
are declared statically in a manifest. These permissions
are set by the package installer, usually via dialogue
with the user.
• Signatures Finally, any Android application must be
signed with a certificate whose private key is held by
the developer. The certificate does not need to be
signed by a certificate authority; it is used only to
establish trust between applications by the same
developer.
Review Literature
• In android operating system, there are four layers.
Android has its own libraries; it is helpful for developing
and designing any application of android platform. These
libraries are written in C/C++. Linux kernel is the 1st layer
which is written in C.
Review Literature
• Application layer: It is the most upper layer in android
architecture. All the applications like camera, Google maps,
browser, sms, calendars, contacts are native applications.
• Application framework: Android applications which are
developing, this layer contain needed classes and services.
Developers can reuse and extend the components already
present in API.
• Activity manager: It manages the lifecycle of applications.
It enables proper management of all the activities. All the
activities are controlled by activity manager.
• Resource manager: It provides access to non-code
resources such as graphics etc.
Review Literature
• Notification manager: It enables all applications
to display custom alerts in status bar.
• Location manager: It fires alerts when user
enters or leaves a specified geographical location.
• Package manager: It is use to retrieve the data
about installed packages on device.
• Libraries: Android has its own libraries, which is
written in C/C++. These libraries cannot be
accessed directly. With the help of application
framework, we can access these libraries.
Security in android
• In this paper, TISSA is a system which is used to provide
security to the contacts, call logs etc.
• By using TISSA, user can easily protect its contacts and
call logs by filling all the permissions.
• After giving all the permissions, user can easily access
its own data in very privacy mode.
• TISSA is evaluated with many of android apps which
are affected by leakage of private information of user.
• In TISSA, there are main three components are used
which provides security to the user for securing call
logs and contacts.
Security in android
• Privacy setting content provider: It is used to provide
current privacy setting for an installed application.
• Privacy setting manager: It is for the user that he/she can
easily update the privacy setting for the installed
application.
• Privacy aware components: These are enhanced to
regulate the access to user’s information which also
includes contacts, call logs and locations.
• TISSA starts works when user sends request through
installed app to the content provider. It holds the request
and check current privacy settings for app. It matches all
the stored information in database and then send result
back to the content provider.
Security in android
Security in android
• There are main three components used which provides the security
to the user, these all are as follows:
• Contacts and Call Logs: In the above diagram, it shows that firstly,
user sends request for accessing the app. When request sends then
content provider checks all the permissions if these all are matched
only then user can easily access its data otherwise it will reject the
permission request from the user side.
• Phone Identity: Each mobile phone has its unique IMEI number for
using GSM and CDMA technologies. In android app can easily use
various functions and retrieve privacy setting for requesting app.
• Location: Here is location manager which always noticed about
user’s location. If user change its location, the registered location
updates location information of the current user.
Conclusion
It provides all over security to contacts, call logs
and location or phone identity, but still there are
some issues while using this system. While using
TISSA, as per system use sometime it will send
bogus or fake replies to the user corresponds to
their request. These fake replies could create
problems for some applications of android.
Another issue in this system is that TISSA only
uses one single privacy setting for one type of
private information.
Security on android

More Related Content

PDF
CNIT 128 7: Mobile Device Management
PPT
Understanding Android Security
PDF
CNIT 128 8: Mobile development security
PDF
CNIT 128: 9: Mobile payments
PDF
Sensor GPP Presentation June 2008
PPT
Android Security
PPTX
Android security
PPTX
Secure SDLC in mobile software development.
CNIT 128 7: Mobile Device Management
Understanding Android Security
CNIT 128 8: Mobile development security
CNIT 128: 9: Mobile payments
Sensor GPP Presentation June 2008
Android Security
Android security
Secure SDLC in mobile software development.

What's hot (20)

PDF
Secure element content
PPTX
Physical security-system
PPTX
Industrial IoT Security Standards & Frameworks
PPTX
Access-control-system
ODP
Mobile Apps Security Testing -1
PDF
iaetsd Second level security using intrusion detection and avoidance system
PDF
Challenges in Testing Mobile App Security
PDF
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
PPTX
Web applications security conference slides
PDF
Stop the Evil, Protect the Endpoint
PPTX
3 steps to 4x the risk coverage of CA ControlMinder
PDF
Reference Security Architecture for Mobility- Insurance
PPTX
PPTX
Signature Enterprise
PDF
Datasheet two factor-authenticationx
PPTX
Security Architecture for Cyber Physical Systems
DOC
Srs template ieee
PDF
Mobile frame asset management in depth
PPTX
Transforming any apps into self-defending apps
PPTX
Classification of embedded systems
Secure element content
Physical security-system
Industrial IoT Security Standards & Frameworks
Access-control-system
Mobile Apps Security Testing -1
iaetsd Second level security using intrusion detection and avoidance system
Challenges in Testing Mobile App Security
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
Web applications security conference slides
Stop the Evil, Protect the Endpoint
3 steps to 4x the risk coverage of CA ControlMinder
Reference Security Architecture for Mobility- Insurance
Signature Enterprise
Datasheet two factor-authenticationx
Security Architecture for Cyber Physical Systems
Srs template ieee
Mobile frame asset management in depth
Transforming any apps into self-defending apps
Classification of embedded systems
Ad

Viewers also liked (13)

PPTX
Research of Cloud Security Communication Firewall Based On Android Platform
DOC
Android Report
PPTX
How to write a literature review in 3 days
DOCX
Vehicle tracking system,be computer android report,android project report,gps...
DOC
Sample literature review
PPT
Restaurant Finder Android Application project Presentation
DOC
PDF
Android College Application Project Report
PPT
Writing Chapters 1, 2, 3 of the Capstone Project Proposal Manuscript
PPTX
Bus tracking application in Android
PPSX
Literature review in research
PDF
Android report
Research of Cloud Security Communication Firewall Based On Android Platform
Android Report
How to write a literature review in 3 days
Vehicle tracking system,be computer android report,android project report,gps...
Sample literature review
Restaurant Finder Android Application project Presentation
Android College Application Project Report
Writing Chapters 1, 2, 3 of the Capstone Project Proposal Manuscript
Bus tracking application in Android
Literature review in research
Android report
Ad

Similar to Security on android (20)

PDF
Mediating Applications on the Android System
PDF
A survey on android security: development and deployment hindrance and best p...
PPTX
Android Security Humla Part 1
PDF
Android security
PDF
Android security
PDF
Cc4201519521
PPTX
PDF
Android security
PDF
Android Security: A Survey of Security Issues and Defenses
PDF
Mobile Application Development with Android
PPTX
Android security
PDF
Detection of Android Third Party Libraries based attacks
PPTX
Androidoverview 100405150711-phpapp01
PDF
Google android security_2018_report
PPT
Analysis and research of system security based on android
PDF
Android open-source operating System for mobile devices
PPTX
Android technology
PDF
android Security
PPTX
3. Android Architecture.pptx
PPTX
Android technology
Mediating Applications on the Android System
A survey on android security: development and deployment hindrance and best p...
Android Security Humla Part 1
Android security
Android security
Cc4201519521
Android security
Android Security: A Survey of Security Issues and Defenses
Mobile Application Development with Android
Android security
Detection of Android Third Party Libraries based attacks
Androidoverview 100405150711-phpapp01
Google android security_2018_report
Analysis and research of system security based on android
Android open-source operating System for mobile devices
Android technology
android Security
3. Android Architecture.pptx
Android technology

Security on android

  • 1. Implementing Security on Android Application Presented By Prabhakar Jha(7cs39)
  • 2. Contents • INTRODUCTION • OVERVIEW OF ANDROID • REVIEW LITERATURE • SECURITY IN ANDROID • CONCLUSION
  • 3. Introduction • Android is Google’s new open-source platform for mobile devices. • It comes with an SDK that provides the tools and APIs necessary to develop new applications for the platform in Java. • Android has its own virtual machine i.e. DVM (Dalvik Virtual Machine), which is used for executing the android applications. • As Android provides remote access to official sensitive data, which can lead to data hack if smart phones are hacked .
  • 4. Overview of Android The application model • An application is a package of components, each of which can be instantiated and run as necessary . • Activity components form the basis of the user interface; usually, each window of the application is controlled by some activity. • Service components run in the background, and remain active even if windows are switched. • Receiver components react asynchronously to messages from other applications. • Provider components store data relevant to the application, usually in a database. Such data can be shared across applications.
  • 5. Overview of Android Security mechanisms • It is possible for an application to share its data and functionality across other applications, such applications access its components. • The key access control mechanisms provided by Android. • Isolation The Android operating system builds on a Linux kernel, and as such, derives several protection mechanisms from Linux. . Every application runs in its own Linux process. Android starts the process when any of the application’s code needs to be run, and stops the process when another application’s code needs to be run.
  • 6. Overview of Android Security mechanisms • Permissions Any application needs explicit permissions to access the components of other applications. Crucially, such permissions are set at install time, not at run time. The permissions required by an application are declared statically in a manifest. These permissions are set by the package installer, usually via dialogue with the user. • Signatures Finally, any Android application must be signed with a certificate whose private key is held by the developer. The certificate does not need to be signed by a certificate authority; it is used only to establish trust between applications by the same developer.
  • 7. Review Literature • In android operating system, there are four layers. Android has its own libraries; it is helpful for developing and designing any application of android platform. These libraries are written in C/C++. Linux kernel is the 1st layer which is written in C.
  • 8. Review Literature • Application layer: It is the most upper layer in android architecture. All the applications like camera, Google maps, browser, sms, calendars, contacts are native applications. • Application framework: Android applications which are developing, this layer contain needed classes and services. Developers can reuse and extend the components already present in API. • Activity manager: It manages the lifecycle of applications. It enables proper management of all the activities. All the activities are controlled by activity manager. • Resource manager: It provides access to non-code resources such as graphics etc.
  • 9. Review Literature • Notification manager: It enables all applications to display custom alerts in status bar. • Location manager: It fires alerts when user enters or leaves a specified geographical location. • Package manager: It is use to retrieve the data about installed packages on device. • Libraries: Android has its own libraries, which is written in C/C++. These libraries cannot be accessed directly. With the help of application framework, we can access these libraries.
  • 10. Security in android • In this paper, TISSA is a system which is used to provide security to the contacts, call logs etc. • By using TISSA, user can easily protect its contacts and call logs by filling all the permissions. • After giving all the permissions, user can easily access its own data in very privacy mode. • TISSA is evaluated with many of android apps which are affected by leakage of private information of user. • In TISSA, there are main three components are used which provides security to the user for securing call logs and contacts.
  • 11. Security in android • Privacy setting content provider: It is used to provide current privacy setting for an installed application. • Privacy setting manager: It is for the user that he/she can easily update the privacy setting for the installed application. • Privacy aware components: These are enhanced to regulate the access to user’s information which also includes contacts, call logs and locations. • TISSA starts works when user sends request through installed app to the content provider. It holds the request and check current privacy settings for app. It matches all the stored information in database and then send result back to the content provider.
  • 13. Security in android • There are main three components used which provides the security to the user, these all are as follows: • Contacts and Call Logs: In the above diagram, it shows that firstly, user sends request for accessing the app. When request sends then content provider checks all the permissions if these all are matched only then user can easily access its data otherwise it will reject the permission request from the user side. • Phone Identity: Each mobile phone has its unique IMEI number for using GSM and CDMA technologies. In android app can easily use various functions and retrieve privacy setting for requesting app. • Location: Here is location manager which always noticed about user’s location. If user change its location, the registered location updates location information of the current user.
  • 14. Conclusion It provides all over security to contacts, call logs and location or phone identity, but still there are some issues while using this system. While using TISSA, as per system use sometime it will send bogus or fake replies to the user corresponds to their request. These fake replies could create problems for some applications of android. Another issue in this system is that TISSA only uses one single privacy setting for one type of private information.