ABSTRACT
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.
The dependence of users on smartphones to accomplish their daily works is growing increasingly. Every day many mobile applications are downloaded and installed by the users to perform different desirable tasks for them. Before it can be installed in the smartphone, the mobile application requests from the user granting some sort of permissions, which may include the access right to users’ sensitive resources. In absence of a security mechanism that can enforce fine-grained permission control, the application may abuse the granted permissions and thus violates the security of sensitive resources. This paper proposes an attribute-based permission model ABP for Android smartphones to control how the mobile application can exercise the granted permissions. The finer granularity of the permission language used by ABP model ensures that the mobile application cannot violate the user’s security. By using ABP model, the users can enjoy the useful tasks the mobile applications provide while protecting sensitive resources from unauthorized use.
To protect sensitive resources from unauthorized use, modern mobile systems, such a Android and iOS,
design a permission-based access control model. However, current model could not enforce fine-grained control
over the dynamic permission use contexts, causing two severe security problems. First, any code package in an
application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps.
Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable
application interactions. Although ad hoc solutions have been proposed, none could systematically solve these
two issues within a unified framework. The first such framework to provide context-sensitive permission
enforcement that regular’s permission use policies according to system-wide application contexts, which cover
both intra-application context and inter-application context. We build a prototype system on Android , named
FineDroid, to track such context during the applicaton execution. To flexibly regulate the context-sensitive
permission rules, FineDroid features a policy framework that could express generic application contexts. We
demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy
framework, for three potential users: end users, administrators and developers. Furthermore, FineDroid is
showed to introduce a minor overhead
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The dependence of users on smartphones to accomplish their daily works is growing increasingly. Every day many mobile applications are downloaded and installed by the users to perform different desirable tasks for them. Before it can be installed in the smartphone, the mobile application requests from the user granting some sort of permissions, which may include the access right to users’ sensitive resources. In absence of a security mechanism that can enforce fine-grained permission control, the application may abuse the granted permissions and thus violates the security of sensitive resources. This paper proposes an attribute-based permission model ABP for Android smartphones to control how the mobile application can exercise the granted permissions. The finer granularity of the permission language used by ABP model ensures that the mobile application cannot violate the user’s security. By using ABP model, the users can enjoy the useful tasks the mobile applications provide while protecting sensitive resources from unauthorized use.
To protect sensitive resources from unauthorized use, modern mobile systems, such a Android and iOS,
design a permission-based access control model. However, current model could not enforce fine-grained control
over the dynamic permission use contexts, causing two severe security problems. First, any code package in an
application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps.
Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable
application interactions. Although ad hoc solutions have been proposed, none could systematically solve these
two issues within a unified framework. The first such framework to provide context-sensitive permission
enforcement that regular’s permission use policies according to system-wide application contexts, which cover
both intra-application context and inter-application context. We build a prototype system on Android , named
FineDroid, to track such context during the applicaton execution. To flexibly regulate the context-sensitive
permission rules, FineDroid features a policy framework that could express generic application contexts. We
demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy
framework, for three potential users: end users, administrators and developers. Furthermore, FineDroid is
showed to introduce a minor overhead
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analysis of XSS attack Mitigation techniques based on Platforms and Browserscscpconf
In the recent years, everything is in web. It may be Organization’s administration software,
Custom ERP application, Employee portals or Real estate portals. The Social networking sites
like Face book, Twitter, MySpace which is a web application is been used by millions of users
around the world. So web applications have become very popular among users. Hence they are
observed and may be exploited by hackers. Researchers and industry experts state that the
Cross-site Scripting (XSS) is the one of the top most vulnerabilities in the web application. The
cross-site scripting has become a common vulnerability of many web sites and web
applications. XSS consists in the exploitation of input validation flaws, with the purpose of
injecting arbitrary script code which is later executed at the web browser of the victim.
According to OSWAP, Cross-site scripting attacks on web applications have experienced an
important rise in recent year. This demands an efficient approach on the server side to protect
the users of the application as the reason for the vulnerability primarily lies on the server side.
The actual exploitation is within the victim’s web browser on the client-side. Therefore, an
operator of a web application has only very limited evidence of XSS issues. However, there are
many solutions for this vulnerability. But such techniques may degrade the performance of the
system. In such scenarios challenge is to decide which method, platform, browser and
middleware can be used to overcome the vulnerabilities, with reasonable performance over
head to the system. Inspired by this problem, we present performance comparison of two mitigation techniques for Cross-site Scripting (XSS) at the server side based on the parameters like application’s platform, middleware technology and browser used by the end user. We implemented Mitigation parsing technique using database and replace technique in different platforms, middleware and checked its performance. We calculated the time taken by different browsers to render the pages using two techniques under different platform and middleware. In this paper we proposed the best combination of development platform, browser and the middleware for the two mitigation technique with respect to developer and end users.
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...IJNSA Journal
Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android’s open-source feature and low barriers to entry for developers. .However, that also attracts many attackers. Over 90 percent of mobile malware is found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some overprivileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoidedbut sensitive Android APIs could be evaded.To the best of our knowledge, our approach provides the first work to decompose Android application behaviors based on system-level behaviors. We then map system level behaviors and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.
Review on mobile threats and detection techniquesijdpsjournal
Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details
such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards
cyber-criminals. In this research work, we have done a systematic review of the terms related to malware
detection algorithms and have also summarized behavioral description of some known mobile malwares
in tabular form. After careful solicitation of all the possible methods and algorithms for detection of
mobile-based malwares, we give some recommendations for designing future malware detection algorithm
by considering computational complexity and detection ration of mobile malwares.
This is an era of technology and Internet is one o f the them which has changed the world the most in last decades. It is open and so anyone can use it to get information about anything, people have been using it for educational, business, social connections and every day work purposes. But the matter of fact is door open in both directions, bad people with bad intensions stared using this technology for evil intensions. They are stealing personal data, financial information, government secrets and many others are target of those people. In this paper we will discuss about vulnerabilities present currently in the network, some case studies and later recommendations to avoid vulnerabilities and prevent them from exploitations are also discussed.
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. The study is about implementation of detecting untrusted on android applications, which would be the basis of all future development regarding malware detection.
The smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, the permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android application, in this paper, the framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and determine if the installed application is untrusted or not. Our result show that, in a collection of 26 untrusted application, the framework is able to correct and determine the application's behavior consistently and efficiently.
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTijesajournal
Diverse types of software are used in almost all sectors of businesses in the modern world. They provide mechanisms that enable buyers and sellers to interact virtually, reduce manual work in businesses and institutions as well as make work a lot easier. Increased demand for software has led to the increased investment that has subsequently attracted numerous security attacks. Millions of resources are held in various software worldwide, cyber-attack criminals have made a career in breaching software security for selfish gains, thus necessitating the development and establishment of secure software. Through a literature review, the work introduces concepts and terms used in secure software development, presents the best practices and provides a review of the models that could be used. Confidentiality, integrity, availability, and non-repudiation are secure software terms that mean it should be secret, safe, and accessible and keeps a record of every activity undertaken. The proposed work advocates for several best practices among them the creation of a secure perimeter that limits access to key segments or parts of the system in addition to reducing attacking surface or rather reducing the opportunities available for cyber-attack. In regard to the engineering of software, the paper recommends that system requirements must be established before the software is created. Additional engineering ought to be done after the system has been evaluated just before the official launch. Moreover, the paper recommends the adoption of strategies that are used by renowned software models such as Microsoft Software Development Life-cycle among others. Those models have put secure software strategies throughout the life-cycle of software development. They recognize the need to put secure engineering systems during the design and utilization of the software because new methods of breaching software security come up every new day. The paper concludes by noting that continued collaborative efforts to guarantee more secure software is still a demanding need. Adherence to basic secure software development and utilization is essential in addition to developing additional engineering that maintains the integrity, confidentially and accessibility of the software.
This presentation done for my MSc studies @ UOM. The presentation is related to the paper "Understanding Android Security" by William Enck, Machigar Ongtang, and Patrick McDaniel. Pennsylvania State University on 2009
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
Today the software technologies have evolved it to the extent that now a customer can have free and open source software available in the market. But with this evolution the menace of software piracy has also evolved. Unlike other things a customer purchases, the software applications and fonts bought don't belong to the specified user. Instead, the customer becomes a licensed user — means the customer purchases the right to use the software on a single computer, and can't put copies on other machines or pass that software along to colleagues. Software piracy is the illegal distribution and/or reproduction of software applications for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. The major reasons of piracy include the high cost of software and the rigid licensing structure which is becoming even less popular due to inefficient software utilization. Various software companies are inclined towards the research of techniques to handle this problem of piracy. Many defense mechanisms have been devised till date but the hobbyists or the black market leaders (so called “software pirates”) have always found a way out of it. This paper identifies the types of piracies and licensing mechanisms along with the flaws in the existing defense mechanisms and examines social and technical challenges associated with handling software piracy prevention. The goal of this paper is to design, implement and empirically evaluate a comprehensive framework for software piracy prevention and optimal utilization of the software.
Analysis of XSS attack Mitigation techniques based on Platforms and Browserscscpconf
In the recent years, everything is in web. It may be Organization’s administration software,
Custom ERP application, Employee portals or Real estate portals. The Social networking sites
like Face book, Twitter, MySpace which is a web application is been used by millions of users
around the world. So web applications have become very popular among users. Hence they are
observed and may be exploited by hackers. Researchers and industry experts state that the
Cross-site Scripting (XSS) is the one of the top most vulnerabilities in the web application. The
cross-site scripting has become a common vulnerability of many web sites and web
applications. XSS consists in the exploitation of input validation flaws, with the purpose of
injecting arbitrary script code which is later executed at the web browser of the victim.
According to OSWAP, Cross-site scripting attacks on web applications have experienced an
important rise in recent year. This demands an efficient approach on the server side to protect
the users of the application as the reason for the vulnerability primarily lies on the server side.
The actual exploitation is within the victim’s web browser on the client-side. Therefore, an
operator of a web application has only very limited evidence of XSS issues. However, there are
many solutions for this vulnerability. But such techniques may degrade the performance of the
system. In such scenarios challenge is to decide which method, platform, browser and
middleware can be used to overcome the vulnerabilities, with reasonable performance over
head to the system. Inspired by this problem, we present performance comparison of two mitigation techniques for Cross-site Scripting (XSS) at the server side based on the parameters like application’s platform, middleware technology and browser used by the end user. We implemented Mitigation parsing technique using database and replace technique in different platforms, middleware and checked its performance. We calculated the time taken by different browsers to render the pages using two techniques under different platform and middleware. In this paper we proposed the best combination of development platform, browser and the middleware for the two mitigation technique with respect to developer and end users.
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...IJNSA Journal
Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android’s open-source feature and low barriers to entry for developers. .However, that also attracts many attackers. Over 90 percent of mobile malware is found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some overprivileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoidedbut sensitive Android APIs could be evaded.To the best of our knowledge, our approach provides the first work to decompose Android application behaviors based on system-level behaviors. We then map system level behaviors and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.
Review on mobile threats and detection techniquesijdpsjournal
Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details
such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards
cyber-criminals. In this research work, we have done a systematic review of the terms related to malware
detection algorithms and have also summarized behavioral description of some known mobile malwares
in tabular form. After careful solicitation of all the possible methods and algorithms for detection of
mobile-based malwares, we give some recommendations for designing future malware detection algorithm
by considering computational complexity and detection ration of mobile malwares.
This is an era of technology and Internet is one o f the them which has changed the world the most in last decades. It is open and so anyone can use it to get information about anything, people have been using it for educational, business, social connections and every day work purposes. But the matter of fact is door open in both directions, bad people with bad intensions stared using this technology for evil intensions. They are stealing personal data, financial information, government secrets and many others are target of those people. In this paper we will discuss about vulnerabilities present currently in the network, some case studies and later recommendations to avoid vulnerabilities and prevent them from exploitations are also discussed.
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. The study is about implementation of detecting untrusted on android applications, which would be the basis of all future development regarding malware detection.
The smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, the permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android application, in this paper, the framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and determine if the installed application is untrusted or not. Our result show that, in a collection of 26 untrusted application, the framework is able to correct and determine the application's behavior consistently and efficiently.
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTijesajournal
Diverse types of software are used in almost all sectors of businesses in the modern world. They provide mechanisms that enable buyers and sellers to interact virtually, reduce manual work in businesses and institutions as well as make work a lot easier. Increased demand for software has led to the increased investment that has subsequently attracted numerous security attacks. Millions of resources are held in various software worldwide, cyber-attack criminals have made a career in breaching software security for selfish gains, thus necessitating the development and establishment of secure software. Through a literature review, the work introduces concepts and terms used in secure software development, presents the best practices and provides a review of the models that could be used. Confidentiality, integrity, availability, and non-repudiation are secure software terms that mean it should be secret, safe, and accessible and keeps a record of every activity undertaken. The proposed work advocates for several best practices among them the creation of a secure perimeter that limits access to key segments or parts of the system in addition to reducing attacking surface or rather reducing the opportunities available for cyber-attack. In regard to the engineering of software, the paper recommends that system requirements must be established before the software is created. Additional engineering ought to be done after the system has been evaluated just before the official launch. Moreover, the paper recommends the adoption of strategies that are used by renowned software models such as Microsoft Software Development Life-cycle among others. Those models have put secure software strategies throughout the life-cycle of software development. They recognize the need to put secure engineering systems during the design and utilization of the software because new methods of breaching software security come up every new day. The paper concludes by noting that continued collaborative efforts to guarantee more secure software is still a demanding need. Adherence to basic secure software development and utilization is essential in addition to developing additional engineering that maintains the integrity, confidentially and accessibility of the software.
This presentation done for my MSc studies @ UOM. The presentation is related to the paper "Understanding Android Security" by William Enck, Machigar Ongtang, and Patrick McDaniel. Pennsylvania State University on 2009
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
Today the software technologies have evolved it to the extent that now a customer can have free and open source software available in the market. But with this evolution the menace of software piracy has also evolved. Unlike other things a customer purchases, the software applications and fonts bought don't belong to the specified user. Instead, the customer becomes a licensed user — means the customer purchases the right to use the software on a single computer, and can't put copies on other machines or pass that software along to colleagues. Software piracy is the illegal distribution and/or reproduction of software applications for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. The major reasons of piracy include the high cost of software and the rigid licensing structure which is becoming even less popular due to inefficient software utilization. Various software companies are inclined towards the research of techniques to handle this problem of piracy. Many defense mechanisms have been devised till date but the hobbyists or the black market leaders (so called “software pirates”) have always found a way out of it. This paper identifies the types of piracies and licensing mechanisms along with the flaws in the existing defense mechanisms and examines social and technical challenges associated with handling software piracy prevention. The goal of this paper is to design, implement and empirically evaluate a comprehensive framework for software piracy prevention and optimal utilization of the software.
A case study of malware detection and removal in android appsijmnct
With the proliferation of smart phone users, android malware variants is increasing in terms of numbers
and amount of new victim android apps. The traditional malware detection focuses on repackage,
obfuscate and/or other transformable executable code from malicious apps. This paper presented a case
study on existing android malware detection through a sequence of steps and well developed encoding SMS
message. Our result has demonstrated a solid testify of our approach in the effectiveness of malware
detection and removal.
Android mobile operating system, Google developed, Linux Kernel based with basic motive to serve for
devices with touchscreen like tablets and smartphones. Due
to weak OS security it is vulnerable to various security attacks therefor to restrict access of third-party applications
off critical resources the security has been built upon a permission based mechanism. Permissions are declarations by
developers and user is demanded to accept. This paper
highlights Share User ID permission misuse following two factor authentication failure etc
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
In the arms race between attackers and defenders, the significance of proactive security measures was evident. The implementation of well-considered countermeasures, which may encompass stringent access controls, regular system updates, intrusion detection systems, and behavioral analysis, emerged as vital strategies to thwart the ever-evolving landscape of APTs. Application Shimming is a tool in the Windows Application Compatibility framework that lets programs work on versions of the operating system they weren't originally made for. Due to this architecture, most programs that previously operated on Windows XP can now operate on Windows 10. Shimming takes parts from a Windows Application Compatibility database after parsing it. Shims, which were created for malware investigators, examine any entry that might have been exploited to compromise a Windows system. This research presents a framework that can compromise the target operating system along with the proposed mitigation techniques.
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
In the arms race between attackers and defenders, the significance of proactive security measures was evident. The implementation of well-considered countermeasures, which may encompass stringent access controls, regular system updates, intrusion detection systems, and behavioral analysis, emerged as vital strategies to thwart the ever-evolving landscape of APTs. Application Shimming is a tool in the Windows Application Compatibility framework that lets programs work on versions of the operating system they weren't originally made for. Due to this architecture, most programs that previously operated on Windows XP can now operate on Windows 10. Shimming takes parts from a Windows Application Compatibility database after parsing it. Shims, which were created for malware investigators, examine any entry that might have been exploited to compromise a Windows system. This research presents a framework that can compromise the target operating system along with the proposed mitigation techniques.
OTS Solutions is powerful development company that focus on rapid product development Android Application Development offers the new trend on the mobile market that help for the dynamic applications or complex applications for Android development. It has a dedicated team of brilliant software professionals in Android Application Development, android programming, outsourced android applications.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Garbage Management using Android Smartphoneijsrd.com
Environmental pollution nowadays is a major aspect to be considered. Pollution has to be avoided and there are several ways to control it. In this paper, we propose an innovative software application, via which a user can send an alert text message and location details to the garbage/waste management department in the campus and also post the same details on the dedicated web server. This information essentially helps the respective department to take care of garbage present in the campus.
Mobile Application Development with AndroidIJAAS Team
The Android is mobile platform. It is an open source and free operating system application, by Google it is developed and maintained. It was designed essentially for touch screen mobile devices, such as and tablet, computers, smart phones, watch television, cars etc. Android is one of the most widely used mobile OS. Android is a not only operating system but also key applications and middleware. Android is an open source operating system. It is developed by the open handset Alliance, led by Google, and other companies. Those are used to android studio 2.2.3 version and development the mobile application.
It prevents accident and alert nearest police station or hospital and it also controls the incoming calls and outgoing calls based on speed of the vehicle.
Steganography methods using network protocolsDr Amira Bibo
The covert channels of type covert storage channels were used in this research to
hide textual data or an (image hiding secrete data) in the transmission protocol layer and
the internet protocol layer of TCP/IP module. We use IP protocol in designing covert
channel by using Identification field, and use TCP protocol in designing covert channel
by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP
protocol by using Echo request message and Message field.
The result of Covert channel after analyzing the protocols (IP, TCP, UDP,
ICMP) header depends on the field that used in the designing the Covert channel. The
access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the
other hand depends on a mechanism of unsafe communication. ICMP protocol provided
a good transmission, though unreliable, in that the message structure can be unreliable
or clear.
An investigation for steganography using different color systemDr Amira Bibo
ABSTRACT
Steganographic techniques are generally used to maintain the confidentiality of
valuable information and to protect it from any possible theft or unauthorized use
especially over the internet. In this paper, Least Significant Bit LSB-based
Steganographic techniques is used to embed large of data in different color space
models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by
transforming the RGB value of the secret image pixels into three separate components
into the pixels of the cover image.
The measures (MSE, SNR, PSNR) were used to compare between the color
space models, the comparisons proved that steganography with color systems (RGB
and HIS) shown a best results.
Supervised classification and improved filtering method for shoreline detection.Dr Amira Bibo
ABSTRACT
Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently,
many researchers have directed attention to methods of predicting shoreline changes by the use of
multispectral images. However, the images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and shoreline using multispectral
satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework
using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the
detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection andthe Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5
images.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmDr Amira Bibo
In this paper, scheduling dependent threads in distributed real-time
system where considered. We present a distributed real-time
scheduling algorithm called (EOE-DRTSA (end-to-end distributed
real time system Scheduling algorithm)). Now a day completed realtime
systems are distributed. One of least developed areas of realtime
scheduling is distributed scheduling where in Distributed
systems action and information timeliness is often end-to-end.
Designers and users of distributed systems often need to dependably
reason about end-to-end timeliness. Our scheduling model includes
threads and their time constraints depend on developed DTUF value
and maintaining end-to-end prosperities of distributed real-time
system.
Developing fault tolerance integrity protocol for distributed real time systemsDr Amira Bibo
In the distributed real time systems, tasks must meet their deadline even in the
presence of hardware/software faults. Fault tolerance in distributed real time systems
refers to the ability of the system to meet the tasks deadline and to detect their failure
and recover them. In this paper, we considered the problem of fault tolerance and
developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault
Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in
distributed real time systems.
Constructing sierpinski gasket using gp us arraysDr Amira Bibo
A fractal is a mathematical set that typically displays self-similar
patterns, which means it is "the same from near as from far".
Fractals may be exactly the same at every scale, they may be
nearly the same at different scales. The concept of fractal extends
beyond trivial self-similarity and includes the idea of a detailed
pattern repeating itself. The algorithms to constructing different
fractal shapes in many cases typically involve large amounts of
floating point computation, to which modern GPUs are well
suited. In this paper we will construct Sierpinski Gasket using
GPUs arrays.
ABSTRACT
Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently,
many researchers have directed attention to methods of predicting shoreline changes by the use of
multispectral images. However, the images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and shoreline using multispectral
satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework
using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the
detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and
the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,
the image undergoes image classification process by using Support Vector Machine. The proposed method
performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5
images.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2. Original article | doi: 10.25007/ajnu.v6n3a97
136 Academic Journal of Nawroz University (AJNU)
consists of the APIs, libraries, and middleware by writing
in c programming language, and above the application
framework the application software is running which
contains other libraries which they are Java-compatible.
Like open source licenses by Google, the Android’s source
code is published. By means of a stack of software
components, the Android operating system is based,
which is organized by five major layers like appeared in
Figure 1. Android operating system and platform
components and layers are described and analyzed as
Threats and Defenses of Android Security (Brähler, 2010).
Fig 1: Android operating system architecture
The Linux kernel is the most important among all layers
of the whole system. This layer for the embedded
environment is customized especially containing limited
resources. The entire Android operating system is
constructed on top of the Linux kernel and by Google
extra architectural changes has been made. This layer as
well performances as a deliberation layer between the
software and hardware layers. The basic system
functionality is provided Linux kernel such as the
management of device, memory, and process. Beside, an
array of device drivers is provided by Linux kernel
which makes the job simpler while communicating the
peripheral devices with Android.
The native libraries of the Android on top of the Linux
kernel were developed. For handling different types of
data on the device this layer is enabled. Different useful
libraries are provided for Android OS as the well-
function. These libraries are developed for a particular
hardware and were written in C or C++ language. As an
example of native libraries such as for Internet security
the SSL libraries are used, for providing various media
codecs the Media framework is used, to show 2D or 3D
graphics content the OpenGL is used, the common
library libc, for storing data the SQLite database engine
is used, and to display HTML content the Web browser
engine WebKit is used.
The Android runtime has an element named Dalvik
Virtual Machine (DVM), which is an interpreter for byte
code that has been converted from Java Virtual Machine
(JVM) particularly designed and enhanced for Android.
From Linux core features the Dalvik takes advantage
such as memory management, multitasking execution
environment, and multi-threading, which is for Java
language it is very essential. Dalvik provides control to
applications to work as a process immediately with its
own VM and the Linux kernel. While Dalvik is utilizing
JVM, which gives clients a group of APIs and libraries to
design and create Android application mainly via Java
3. Original article | doi: 10.25007/ajnu.v6n3a97
Academic Journal of Nawroz University (AJNU) 137
programming language.
The application framework is written in Java and it is a
collection of services that together make an environment
for managing and running Android applications. As Java
classes, the services are provided to applications. These
services are allowed for application developers to use in
their applications. The main services of application
framework are View System, Notifications Manager,
Resource Manager, Content Providers, and Activity
Manager.
Application layer which is the last layer is placed on the
upper of the Android operating system stack. This layer
involve both of the preinstalled application and third-
party application developed and created by informal
application developers, such as Contacts Manager,
Browser, and Email apps.
2. Android Security Threats
Android operating system security is designed as a
permission-based mechanism which manages and
control the admission and approval of third-party
Android apps to reach critical resources. This
permission-based mechanism is extensively criticized for
the inefficient permission management and controlling
the application permissions, by end-users, marketers,
and developers. Let's say, all permission requests from
an app can either be accepted by users to install it or not.
Here, the major security threats of the Android will be
discussed, which makes the user’s information
vulnerable to leak and places the privacy at risk (Faruki
et al., 2015).
2.1. Information Leakage
The design of the present Android architecture restricts
applications from using or accessing other applications
or resources except it is approved by the users. Before
installing and using an application the user has to grant
all access requests of the resources. Information leakage
happens when without any restriction from OS the users
grant resources. However, permission control
mechanism of the Android Operating system
ineffectively protect user’s resource and privacy from
malware.
2.2. Privilege Escalation
Privilege escalation threats are utilized by taking
advantage of freely accessible Android kernel
vulnerabilities to obtain higher or all access to resources
which is typically protected from a user or app. Such
kind of threat can be a consequence of unauthorized
activities from apps with extra privileges than intended,
as a result, can lead to many sensitive information
leakages. To obtain access to the critical permissions the
Android exported components can be exploited.
2.3. Repackaging Apps
In the Android operating system, one of the most
common and important security threat is Repackaging.
Repackaging by using reverse-engineering techniques
can apply decompiling/disassembling of .apk files and
inserting malicious code inside the main source code. By
using of repackaging techniques as a normal app with
distract the malicious code can be disguised. The
differentiate between a normal app and a repackaged
malicious code can be difficult because as the same way
as the legitimate one the repackaged app typically
appears to function.
2.4. Denial of Service Attack
The growing quantity of mobile devices which they are
connected to the Internet as a big network which could
be a stage for evolution of DoS attacks. Because the
smartphones are not fortified or having less protections
compared with PCs, the developers of malicious
applications find it as an appropriate platform for DoS
attacks. The primarily objectives of DoS attacks are
targeting Overusing limited CPU, battery power,
memory, and network bandwidth.
2.5. Colluding
The colluding threat is happening from the side of the
users. Here, users deploy a group of applications that
have the same certificate and grant various sorts of
permissions could be non-sensitive or sensitive. These
applications after installing it can get access to all their
resources and permissions by taking advantage of a
shared UID.
3. Proposed Solutions
Android security solutions separated into two kinds: 1)
Static; 2) Dynamic which both can use for vulnerability
assessment, analysis, and detection. Static methods are
fast, yet it needs to manage false-positives sensibly.
Dynamic methods, however time-consuming, are
exceptionally useful when applications are extremely
obscured. There are also hybrid methods that merge both
dynamic and static methods together with the limitations
of both.
3.1. Crowdroid
In (Burguera, Zurutuza, & Nadjm-Tehrani, 2011) they
proposed a Crowrdoid system which is a behavior based
malware detection. Which is having two mechanisms, a
crowd sourcing application that should be deployed on
user-devices and other is for malware detection which is
a remote-server. The crowd sourcing application
communicates with the remote server by sending the
behavioral data and this data could be as an application
log file. The application log file contains fundamental
device info, behavioral data, and a list of installed apps.
This data is processed at the remote-server to produce
feature vectors which later might be analyzed by 2-
means partition clustering for recognizing if the app
malicious or benign. An application report is created and
deposited in the remote-server’s database.
3.2. AndroSimilar
In (Faruki, Ganmoor, Laxmi, Gaur, & Bharmal, 2013)
they propose AndroSimilar method which is used
4. Original article | doi: 10.25007/ajnu.v6n3a97
138 Academic Journal of Nawroz University (AJNU)
statistically implausible feature selection by means of
similarity digest hashing mechanism. The proposed
solution efficiently detects code obfuscated malware,
control flow obfuscation, method renaming, and junk
method addition. Signature produced through the
proposed method is sufficiently solid to detect unknown
samples obfuscated with several code obfuscation
techniques which they are not detected by the common
Antivirus application. Manually analyzing the suspected
samples detected by the method in which through
present Android malware signatures is verifying their
similarity. This proposed signature method is strong in
counter to repackaged apps.
3.3. Kirin
In (Bahman Rashidi, Fung, & Vu, 2014) they proposed
Kirin method the main goal of this method is to
qualifying malicious applications at install time utilizing
certification process on applications. On app’s requested
permissions this method uses a set of previously defined
security rules for finding the matched permission
requests that are considered as a malicious. The defined
rules are based on the sensitive permissions which lead
to abusing of dangerous activities and permissions.
3.4. RecDroid
In (B Rashidi, Fung, & Vu, 2014) they proposed the
RecDroid method it is a framework through
crowdsourcing for resource accessing permission
control. RecDroid tries to help users to choose the correct
choice to decide if a permission request ought to be
denied or accepted. RecDroid is an approval framework
that brings together the user’s permission responses to
the application’s permission requests, also for evaluating
the level of experience of users this method is utilized
and to figure a proper response to the permission request
even to be rejected or accepted. RecDroid depends on a
slight group of seed expert users that might generate
dependable recommendations for a slight group of apps.
To ignore malicious responses and detecting the
malicious clients this method in addition utilizes a game-
theoretic Bayesian.
3.5. Aurasium
In (Xu, Saïdi, & Anderson, 2012) they proposed
Aurasium technique which is a very useful technique
that takes control of execution of applications, by forcing
arbitrary security rules at runtime. In order to have the
ability to do that, Aurasium includes code for rules
enforcement to Android applications by repackages it.
Aurasium can apply security rules across multiple
applications not only at individual application. Any
privacy and security violations are informed to the user.
So, it rejects the necessity of manipulating an Android
operating system to monitor application behavior. It
interferes when the application accessing sensitive data
like phone identifiers, messages, contacts and
implementing shell-commands by requesting the user
for approval regarding the same.
3.6. FireDroid
In (Russello, Jimenez, Naderi, & van der Mark, 2013) they
propose FireDroid which is a framework that is policy-
based by interleaving process system calls can
implementing security policies. In this method an
application monitor is generated for tracking all
processes spawned in Android operating system and
based on humanly managed policies can accept or reject
them. At runtime, the FireDroid can identify if an app is
executing illegitimate or potentially harmful actions by
interrupting the system calls the app executes.
Regardless of if the malware is repackaged or a new type
of an existing one: FireDroid can detect and implement
the proper security policies once the malware executes
harmful system calls.The objective of FireDroid is that it
is entirely transparent to the apps along with Android
operating system. By this the users are not complicated
with a heavy interaction.
3.7. DroidScope
In (Yan & Yin, 2012) they proposed DroidScope which is
a Virtual Machine Introspection (VMI) that is for
Android applications is dynamic analysis framework.
Contrasting other dynamic analysis frameworks, it
doesn't be located inside the emulator but creating
Dalvik-level and OS-level semantics by locating outside
the emulator. By this, even in the kernel, the privilege
escalation attacks can be detected. It likewise makes the
attackers mission of disorderly analysis hard. upon
QEMU emulator the DroidScope is built, and likewise,
make a set of APIs available to modify analysis needs to
human analysts.
3.8. RiskMon
In (Jing, Ahn, Zhao, & Hu, 2014) they propose the
RiskMon method which is integrated runtime behaviors
and user’s expectations of authorized apps to produce a
risk assessment baseline in which can seizures suitable
behaviors of apps. User’s expectations on the apps are
the key part of the operating system. Initially, the user’s
expectations of the deployed applications are gathered
and the position of permission sets based on their
relevancy to the corresponding app. After that,
depending on the gathered data from the user, it
generates or produce the risk assessment baseline for the
apps. Lastly, utilizing the produced baseline, the method
ranks deployed apps depending on the risk of the
application’s interactions.
3.9. RiskRanker
In (Grace, Zhou, Zhang, Zou, & Jiang, 2012) they propose
RiskRanker is a practical active procedure to recognize
zero-day Android malicious apps. It attempts to assess
potential security risks caused by unauthorized
applications. They design an automated system with the
purpose of analyzing the harmful behavior of
applications dynamically. The proposed method
5. Original article | doi: 10.25007/ajnu.v6n3a97
Academic Journal of Nawroz University (AJNU) 139
achieves a two-stage risk analysis. Firstly, they
recognizes applications with medium and high risk. The
purpose of recognizing these applications it traces non-
obfuscated implementations of applications that invoke:
privacy violation attacks, illegal cost creation, and
launching root exploits. Secondly, so as to determine
those applications that encrypt exploit code to avoid the
previous stage analysis it achieves an additional
investigation by analyzing suspicious application
behavior. To solve this encounter, they make a set of
heuristics to map applications to associated risk types
(Low, Medium, and High risk).
3.10. DroidRanger
In (Zhou, Zhou, Jiang, & Ning, 2012) they present a
survey to estimate the security of applications on some
existing unofficial Android application markets and
Google Play. The DroidRanger has two-stage analysis to
detect zero-day malware and existing known malware.
They utilize a permission-based behavioral footprinting
scheme so as to detect known malware. The other stage,
to identify certain inherent behaviors of a zero-day
malware they apply a heuristics-based filtering scheme.
The summary of all previous proposed solutions is
presented in Table.1.
Table.1. Proposed solutions
Proposed
Solutions
Objective Mechanisms
Assessment Analysis Detection Static Dynamic
Crowrdoid
AndroSimilar
Kirin
RecDroid
Aurasium
FireDroid
DroidScope
RiskMon
RiskRanker
DroidRanger
4. Conclusion
Alongside the expanding of Android smartphones, the
quantity of Android applications, as well as malware is
expanding daily. Regardless of existing Android security
system, malware exploits the existing security system’s
weakness to reach and access the granted resources. By
this means, various solutions have been proposed in
order to control and prevent the vulnerabilities in
Android platform. In this review paper, the proposed
solution is divided into two groups static and dynamic
and into three goals assessment, analysis, and detection.
REFERENCES
Android. (2017). Android Security Overview. Retrieved
from https://source.android.com/security/
Appbrain. (2017). Number of android applications.
Retrieved July 28, 2017, from
http://www.appbrain.com/stats/number-of-android-
apps
Brähler, S. (2010). Analysis of the Android Architecture.
Karlsruhe Institute for Technology, 52. Retrieved from
http://os.ibds.kit.edu/downloads/sa_2010_braehler
-stefan_android-architecture.pdf
Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011).
Crowdroid: Behavior-Based Malware Detection
System for Android. Proceedings of the 1st ACM
Workshop on Security and Privacy in Smartphones and
Mobile Devices - SPSM ’11, 15.
https://doi.org/10.1145/2046614.2046619
Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M.
S., Conti, M., & Rajarajan, M. (2015). Android security:
A survey of issues, malware penetration, and
defenses. IEEE Communications Surveys and Tutorials,
17(2), 998–1022.
https://doi.org/10.1109/COMST.2014.2386139
Faruki, P., Ganmoor, V., Laxmi, V., Gaur, M. S., &
Bharmal, A. (2013). AndroSimilar : Robust Statistical
Feature Signature for Android Malware Detection.
Proceedings of the 6th International Conference on Security
of Information and Networks, (September 2015), 152–159.
https://doi.org/10.1145/2523514.2523539
Grace, M., Zhou, Y., Zhang, Q., Zou, S., & Jiang, X. (2012).
RiskRanker: Scalable and Accurate Zero-day Android
Malware Detection. 10th International Conference on
Mobile Systems, Applications, and Services, 281–294.
https://doi.org/10.1145/2307636.2307663
Jing, Y., Ahn, G.-J., Zhao, Z., & Hu, H. (2014). RiskMon :
Continuous and Automated Risk Assessment of
Mobile Applications. Proceedings of the 4th ACM
Conference on Data and Application Security and Privacy
- CODASPY ’14, 99–110.
https://doi.org/10.1145/2557547.2557549
Rashidi, B., Fung, C., & Vu, T. (2014). On lightweight
mobile phone application certification. Proceedings of
the ACM MobiCom Workshop on Security and Privacy in
Mobile Environments, 235–245.
6. Original article | doi: 10.25007/ajnu.v6n3a97
140 Academic Journal of Nawroz University (AJNU)
https://doi.org/10.1145/1653662.1653691
Rashidi, B., Fung, C., & Vu, T. (2014). RecDroid: A resource
access permission control portal and recommendation
service for smartphone users. 2014 ACM MobiCom
Workshop on Security and Privacy in Mobile
Environments, SPME 2014, 13–17.
https://doi.org/10.1145/2646584.2646586
Russello, G., Jimenez, A. B., Naderi, H., & van der Mark,
W. (2013). FireDroid: hardening security in almost-
stock Android. Proceedings of the 29th Annual Computer
Security Applications Conference, 319–328.
https://doi.org/10.1145/2523649.2523678
Xu, R., Saïdi, H., & Anderson, R. (2012). Aurasium:
Practical Policy Enforcement for Android
Applications. Proceedings of the 21st USENIX
Conference, 27. Retrieved from
https://www.usenix.org/system/files/conference/
usenixsecurity12/sec12-
final60.pdf%5Cnhttp://dl.acm.org/citation.cfm?id=2
362793.2362820
Yan, L. K., & Yin, H. (2012). DroidScope: Seamlessly
Reconstructing the OS and Dalvik Semantic Views for
Dynamic Android Malware Analysis. In USENIX
Security Symposium.
https://doi.org/10.1145/2420950.2420980
Zhou, W., Zhou, Y., Jiang, X., & Ning, P. (2012). Detecting
repackaged smartphone applications in third-party
android marketplaces. Proceedings of the Second ACM
Conference on Data and Application Security and Privacy -
CODASKY ’12, 317–326.
https://doi.org/10.1145/2133601.2133640