Abstract

Most Android users are unaware that their smartphones are as vulnerable as any computer, and that permission by Android users is an important part of maintaining the security of Android smartphones. We present a method that uses manifest files to determine the presence of spyware and the security level of apps. Furthermore, to ensure that no leaked data occurs in Android smartphones, we propose new method for the encryption of data from Google Suite applications.

Highlights

  • In 2017, Android accounted for 85% of the smartphone market, and the Android operating system was the most popular

  • The aim of the “Android Security Development” project is to provide a safer environment for Android smartphone users by detecting spyware more efficiently and effectively, prevent the leakage of personal information from Android smartphones, and raise awareness regarding permission for apps downloaded by Android users

  • The security level index of these applications is less than 50%, whereas the apps that request less permission include Subway Surf, the Starbucks app, and Clash of Clans, whose security level indexes are greater than 80%

Read more

Summary

Introduction

In 2017, Android accounted for 85% of the smartphone market, and the Android operating system was the most popular. Android is an open-source operating system that is often targeted by malicious software. In 2017, there were more than 3.5 million malware applications [1]. Since the development of Android 6.0 in 2015, Android has required permission for apps considered dangerous, and users can revoke this permission at any time [2]. The aim of the “Android Security Development” project is to provide a safer environment for Android smartphone users by detecting spyware more efficiently and effectively, prevent the leakage of personal information from Android smartphones, and raise awareness regarding permission for apps downloaded by Android users. Personal information in smartphones may include contacts, calendar schedule, and location, to name a few

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.