Automated security certification of Android application

Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications(app) to share their code and data with other applications. While such sharing can be tightly controlled with permissions, in general users cannot determine what applicat...

Full description

Bibliographic Details
Main Author: Tay, Chee Yang
Other Authors: Liu Yang
Format: Final Year Project (FYP)
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/55012
_version_ 1811686133369667584
author Tay, Chee Yang
author2 Liu Yang
author_facet Liu Yang
Tay, Chee Yang
author_sort Tay, Chee Yang
collection NTU
description Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications(app) to share their code and data with other applications. While such sharing can be tightly controlled with permissions, in general users cannot determine what applications will do with their data, and thereby cannot decide what permissions such applications should run with. Thus with the increasing sales Android powered devices, better security is required to keep up with the growing trend. The first part of the report examines the structure and characteristic of some common malwares found in Android applications and provides findings on these malware. Analysis were made by either researching on the works of other researchers in the field or decompiling the malware file to study its source codes and structure. Using these knowledge, new findings were inferred and are mainly focusing on the trigger of attacks and impacts that these malware have on the infected Android device and their owner. The second part of the report describes the concept of a collaborative environment for detection of malicious application and gathering data for analysis of malicious activities or emerging threats. The concept of identifying malicious activities from Hyper-Text Transfer Protocol(HTTP) traces can be done by creating a dependency graph to visualize the relations between the traces and using this graph, analysis can be made to identify any malicious activities that could have existed based on the relationship among them. This report is useful for other researchers to learn about the trigger of attacks and impact of the malwares analyzed in this project. This report also demonstrate the concept of collaborative environment on its efficiency and the type of attacks that this kind of environment can help to discovers.
first_indexed 2024-10-01T04:55:34Z
format Final Year Project (FYP)
id ntu-10356/55012
institution Nanyang Technological University
language English
last_indexed 2024-10-01T04:55:34Z
publishDate 2013
record_format dspace
spelling ntu-10356/550122023-03-03T20:45:21Z Automated security certification of Android application Tay, Chee Yang Liu Yang School of Computer Engineering Forensics and Security Lab DRNTU::Engineering::Computer science and engineering::Information systems::Information systems applications Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications(app) to share their code and data with other applications. While such sharing can be tightly controlled with permissions, in general users cannot determine what applications will do with their data, and thereby cannot decide what permissions such applications should run with. Thus with the increasing sales Android powered devices, better security is required to keep up with the growing trend. The first part of the report examines the structure and characteristic of some common malwares found in Android applications and provides findings on these malware. Analysis were made by either researching on the works of other researchers in the field or decompiling the malware file to study its source codes and structure. Using these knowledge, new findings were inferred and are mainly focusing on the trigger of attacks and impacts that these malware have on the infected Android device and their owner. The second part of the report describes the concept of a collaborative environment for detection of malicious application and gathering data for analysis of malicious activities or emerging threats. The concept of identifying malicious activities from Hyper-Text Transfer Protocol(HTTP) traces can be done by creating a dependency graph to visualize the relations between the traces and using this graph, analysis can be made to identify any malicious activities that could have existed based on the relationship among them. This report is useful for other researchers to learn about the trigger of attacks and impact of the malwares analyzed in this project. This report also demonstrate the concept of collaborative environment on its efficiency and the type of attacks that this kind of environment can help to discovers. Bachelor of Engineering (Computer Science) 2013-11-29T06:37:48Z 2013-11-29T06:37:48Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/55012 en Nanyang Technological University 38 p. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering::Information systems::Information systems applications
Tay, Chee Yang
Automated security certification of Android application
title Automated security certification of Android application
title_full Automated security certification of Android application
title_fullStr Automated security certification of Android application
title_full_unstemmed Automated security certification of Android application
title_short Automated security certification of Android application
title_sort automated security certification of android application
topic DRNTU::Engineering::Computer science and engineering::Information systems::Information systems applications
url http://hdl.handle.net/10356/55012
work_keys_str_mv AT taycheeyang automatedsecuritycertificationofandroidapplication