A novel approach to restrict the access of malicious applications in android

Smartphones have become the important part of our lives. We carry Smartphones to carry out a wide range of services ranging from social networking to internet banking. Security of our private data stored in our smartphone is very important as there are thousands of applications that we can download and install from different app stores, without checking the authenticity of these apps. In order to enhance the security of our smart phones we propose and implement a novel algorithm which can stop the access of the malicious apps at runtime. The algorithm keeps track of all the apps running in the background and monitors their activity. If the app tries to do something which it was not supposed to do it automatically informs the novice user about the malicious activity. We proposed the algorithm for Android based Smartphones.

[1]  Rafael Fedler,et al.  Android oS Security : riSkS And LimitAtionS A PrActicAL evALuAtion , 2012 .

[2]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[3]  Yuval Elovici,et al.  Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.

[4]  Julian Schütte,et al.  On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .

[5]  Toshiaki Tanaka,et al.  A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework , 2010, 2010 IEEE Second International Conference on Social Computing.

[6]  Toshiaki Tanaka,et al.  Towards Formal Analysis of the Permission-Based Security Model for Android , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.

[7]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[8]  Daniel Bilar,et al.  Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.

[9]  Yuval Elovici,et al.  Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.

[10]  Johan Gunnarsson,et al.  Text mining of personal communication , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.

[11]  Masakatsu Nishigaki,et al.  A Proposal to Realize the Provision of Secure Android Applications -- ADMS: An Application Development and Management System , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[12]  Evgenios Konstantinou,et al.  Metamorphic Virus: Analysis and Detection , 2008 .

[13]  Patrick D. McDaniel,et al.  Understanding Android Security , 2009, IEEE Security & Privacy Magazine.

[14]  Eleazar Aguirre Anaya,et al.  Security controls for Android , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[15]  Toshiaki Tanaka,et al.  A Small But Non-negligible Flaw in the Android Permission Scheme , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.