Authentication of mobile applications through various local distributors

Trends in software distribution indicate a rapid change in an online application market. Current smartphones enable users to easily install various applications that are purchased from the online market using their phone. In addition, the openness of the Android system even allows users to choose from various online markets. Because such openness also invokes critical threats such as malware and illegal use, several online markets employ strong authentication techniques. However, such methods can also inconvenience valid users. In this paper, we discuss such problems and propose the concept of an authentication model that makes purchased applications available in most cases.

[1]  Florian Michahelles,et al.  Detection of Malicious Applications on Android OS , 2010, ICWF.

[2]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[3]  Yajin Zhou,et al.  Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.

[4]  Giuseppe Cattaneo,et al.  A Novel Anti-forensics Technique for the Android OS , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[5]  Michael Backes,et al.  A Novel Attack against Android Phones , 2011, ArXiv.