SlideShare a Scribd company logo
Mohammed Alharbi
What is Android?
•Android is a software stack
for mobile devices that
includes an operating system


•Developed by Google and
Open Handset Alliance ‘OHA’


•Android platform using the
Java programming language


•Largest market share ,more than
Symbian and IOS
Application Components
• Activities: An activity represents a single screen with
  a user interface.

• Services: It is runs in the background .

• Broadcast receivers: Responds to system-wide
  broadcast announcements.

• Content providers: It is manages a shared set of
  application data.
Types of threats
• Malware apps:
 The idea is to lure users into downloading a free or heavily
 discounted game, get them to launch it, and clandestinely install
 malware behind their back.

• Drive-by exploits:
  The idea is to lure Android users to visit a website containing code
 that exploits a known weakness in a browser.
• Web Browser Vulnerability
  • available as of October 22, 2008.
  • Can affect any information browser have access on them.
• GappII
  • The service runs behind the scene and monitors the status
    of current phone screen.
  • can be remotely controlled to install additional apps without
    user’s knowledge.
• UpdtKiller
  • Upload victims’ personal information and retrieve commands
    from a remote control and command (C&C) server.
  • Block antivirus software processes so that viruses can’t be
    detected.
• UpdtBot
  • UpdtBot registers a remote Command and Control (C&C) server.
  • Can send text messages, make phone calls, and download and
    install apps.
Security Mechanism
                                 in Android
Sandboxes
 Each application is
 associated with a
 different UID.
 Every application runs
 in its own Linux process.
 Each process runs on
 its own Java VM.
 Application’s directory
 is only available to the
 application.
Security Mechanism
                                  in Android

Permissions
• Any application needs
  explicit permissions to
  access the components of
  other applications.


• These permissions are set
  by the package installer.
Security Mechanism in Android

Signatures
   Any Android application must be signed with a
    certificate whose private key is held by the
    developer.
   Identify the code's author.
   Detect if the application has changed.
   Establish trust between applications.
How to protect ourselves
• Download Apps Only from Trusted Sources

• Always check app permissions. Whenever you download
  or update an app, you get a list of permissions for it.

• Don't View Sensitive Information on Public Wi-Fi

• Put a malware and antivirus scanner on your phone.

• Protect Your Phone with a Password
Conclusion
• Android has a unique security model, which
  focuses on putting the user in control of the
  device.

• It is balance between security and usability.
Thank you ….

More Related Content

What's hot

Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
Ericom Software
 
BOTNET
BOTNETBOTNET
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
Lacoon Mobile Security
 
Lab 2
Lab 2Lab 2
Untitled 1
Untitled 1Untitled 1
Untitled 1
Sergey Kochergan
 
Code protection
Code protectionCode protection
Code protection
whitecryption
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?
Chetu
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
yashwanthlavu
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
HHSome
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 
Network security
Network securityNetwork security
Network security
Preethi B
 
Ankit dwivedi ad
Ankit dwivedi adAnkit dwivedi ad
Ankit dwivedi ad
AnkitDwivedi74
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
Subho Halder
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
Jennifer Cataluña
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
Jennifer Cataluña
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
Lorie Jane Abao
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
Blueboxer2014
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
Itai Bass
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
Appknox
 

What's hot (20)

Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
BOTNET
BOTNETBOTNET
BOTNET
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
Lab 2
Lab 2Lab 2
Lab 2
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Code protection
Code protectionCode protection
Code protection
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Network security
Network securityNetwork security
Network security
 
Ankit dwivedi ad
Ankit dwivedi adAnkit dwivedi ad
Ankit dwivedi ad
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 

Viewers also liked

Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1
Freek Onzia
 
J dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJ dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classrooms
Jennifer DLC
 
Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2
Freek Onzia
 
Storyboard
StoryboardStoryboard
Storyboard
erinsmolenski
 
Creative and Effective Instructional Design
Creative and Effective Instructional DesignCreative and Effective Instructional Design
Creative and Effective Instructional Design
iLearn
 
Dunia keegoisan
Dunia keegoisanDunia keegoisan
Dunia keegoisan
nunnhalgii
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Ryutarou Satou
 
Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Freek Onzia
 
最短でスーパー MRになる方法
最短でスーパー MRになる方法最短でスーパー MRになる方法
最短でスーパー MRになる方法
Ryutarou Satou
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Ryutarou Satou
 
Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Freek Onzia
 
Positief coachen
Positief coachenPositief coachen
Positief coachenFreek Onzia
 
Mungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaikMungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaik
nunnhalgii
 
ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ครูหนุ่ม สอนศิลปะ
 
Positief coachen.kbkb def
Positief coachen.kbkb defPositief coachen.kbkb def
Positief coachen.kbkb defFreek Onzia
 

Viewers also liked (19)

Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1
 
J dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJ dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classrooms
 
Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2
 
Teamcoaching
TeamcoachingTeamcoaching
Teamcoaching
 
Storyboard
StoryboardStoryboard
Storyboard
 
Creative and Effective Instructional Design
Creative and Effective Instructional DesignCreative and Effective Instructional Design
Creative and Effective Instructional Design
 
Dunia keegoisan
Dunia keegoisanDunia keegoisan
Dunia keegoisan
 
E41
E41E41
E41
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)
 
Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4
 
最短でスーパー MRになる方法
最短でスーパー MRになる方法最短でスーパー MRになる方法
最短でスーパー MRになる方法
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)
 
Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3
 
Presentationรวมภาพเด็ก
Presentationรวมภาพเด็กPresentationรวมภาพเด็ก
Presentationรวมภาพเด็ก
 
ตัวอย่างงานศิลปะ
ตัวอย่างงานศิลปะตัวอย่างงานศิลปะ
ตัวอย่างงานศิลปะ
 
Positief coachen
Positief coachenPositief coachen
Positief coachen
 
Mungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaikMungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaik
 
ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ
 
Positief coachen.kbkb def
Positief coachen.kbkb defPositief coachen.kbkb def
Positief coachen.kbkb def
 

Similar to Android security

android Security
android Security android Security
android Security
darkC0de
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
Ravishankar Kumar
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
G Prachi
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
Harsimran Walia
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
Denim Group
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
Harsimran Walia
 
Security on android
Security on androidSecurity on android
Security on android
pk464312
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
Nikhil Kulkarni
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
n|u - The Open Security Community
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
Aayush Gupta
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
Justin Hoang
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
Bitbar
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
NomanKhan869872
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
Denim Group
 
Android ppt
Android pptAndroid ppt
Android Applications
Android ApplicationsAndroid Applications
Android Applications
Nazeer Hussain University
 
Android ppt
Android ppt Android ppt
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 

Similar to Android security (20)

android Security
android Security android Security
android Security
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Security on android
Security on androidSecurity on android
Security on android
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Android ppt
Android ppt Android ppt
Android ppt
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 

Recently uploaded

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Android security

  • 1.
  • 3. What is Android? •Android is a software stack for mobile devices that includes an operating system •Developed by Google and Open Handset Alliance ‘OHA’ •Android platform using the Java programming language •Largest market share ,more than Symbian and IOS
  • 4. Application Components • Activities: An activity represents a single screen with a user interface. • Services: It is runs in the background . • Broadcast receivers: Responds to system-wide broadcast announcements. • Content providers: It is manages a shared set of application data.
  • 5.
  • 6. Types of threats • Malware apps: The idea is to lure users into downloading a free or heavily discounted game, get them to launch it, and clandestinely install malware behind their back. • Drive-by exploits: The idea is to lure Android users to visit a website containing code that exploits a known weakness in a browser.
  • 7. • Web Browser Vulnerability • available as of October 22, 2008. • Can affect any information browser have access on them. • GappII • The service runs behind the scene and monitors the status of current phone screen. • can be remotely controlled to install additional apps without user’s knowledge.
  • 8. • UpdtKiller • Upload victims’ personal information and retrieve commands from a remote control and command (C&C) server. • Block antivirus software processes so that viruses can’t be detected. • UpdtBot • UpdtBot registers a remote Command and Control (C&C) server. • Can send text messages, make phone calls, and download and install apps.
  • 9. Security Mechanism in Android Sandboxes Each application is associated with a different UID. Every application runs in its own Linux process. Each process runs on its own Java VM. Application’s directory is only available to the application.
  • 10. Security Mechanism in Android Permissions • Any application needs explicit permissions to access the components of other applications. • These permissions are set by the package installer.
  • 11. Security Mechanism in Android Signatures  Any Android application must be signed with a certificate whose private key is held by the developer.  Identify the code's author.  Detect if the application has changed.  Establish trust between applications.
  • 12. How to protect ourselves • Download Apps Only from Trusted Sources • Always check app permissions. Whenever you download or update an app, you get a list of permissions for it. • Don't View Sensitive Information on Public Wi-Fi • Put a malware and antivirus scanner on your phone. • Protect Your Phone with a Password
  • 13. Conclusion • Android has a unique security model, which focuses on putting the user in control of the device. • It is balance between security and usability.