A Review of Android Security System
A Review of Android Security System
Keywords- Android, Permissions, Shared User ID, Security, Data Theft, Spyware, IOS, Windows.
© 2019 IJSRET
615
International Journal of Scientific Research & Engineering Trends
Volume 5, Issue 2, Mar-Apr-2019, ISSN (Online): 2395-566X
requiring limited security mechanisms from IT taking the second place since 2015, while the other OSs
companies and technology infrastructures with applying is simply following. It is worth mentioning that OSs like
new levels of security in order to safeguard user„s data. Windows phone and Blackberry are losing the market
Meanwhile, existing technologies for the security could share considerably from 2015 to 2018.
be embedded within mobile platforms architecture such
as ‗firewalls, authentication servers, biometrics, II. SECURITY ATTACKS IN ANDROID
cryptography, and Virtual Private Network„[8]. 1. Permission Escalation Attack- It allows a malicious
application to collaborate with other applications so as to
In Android, other than google play store, it is possible to access critical resources without requesting for
install the applications from unknown sources. But, in corresponding permissions explicitly [5][6].
IOS, the apps can be only installed from AppStore. It is
one of the major security breaches in Android. Due to 2. Collision Attack- Android supports shared user ID
various security breaches in Android, attackers already [5][7]. It is a technique wherein two or more application
regard smartphone as the target to steal personal share the same user id so that they can access the
information using various malware. In 2013, permissions which are granted to each other. for
MohdShahdi Ahmad et al. [3] indicated the analysis of example. if application a has permissions to
Android and IOS regarding security and declared IOS read_contacts, read_phone_status and b has permissions
more secure than Android. In 2014, to read_messages, location_access, if both the
applications use the same user id shareduserid, then it is
A. Kaur et al. [4] indicated that it is possible to revoke possible for application a to use the permissions granted
granted permissions from android application. The rest to itself and the permissions granted to b. similarly, it is
of the paper organizes as Section II describes various possible for application b to use the permissions granted
security attacks on Android such as permission to itself and the permissions granted to A.
escalation attack, confused deputy attack, direct collision
attack, indirect collision attack and TOCTOU (Time of Every Android application has unique ID that is its
Check and Time of Use) attack. Section III describes package name. Android supports shared User ID. It is an
different types of Android app permissions, over- attribute in AndroidManifest.xml file. If this attribute
claiming of app permissions, and misuse of app assigned with the same value in two or more applications
permissions using Shared User ID and failure of two- and if the same certificate signs these applications. They
factor authentication in Android-based smart phones due can access permissions granted to each other. Collision
to spyware. Section IV presents the comparison of attack has been classified as direct collision attack and
security between Android and IOS. Section V presents indirect collision attack. A direct collision attack is
the proposed method to avoid misuse of app permissions wherein application communicates directly. In Indirect
and the conclusion of the paper. Table 1 provides an collision attack application communicates via third party
overview of global Smartphone platforms sales to end- application or component.
users in March 2018.
3. Time of Check and Time of Use Attack- The main
Table 1 Market Share Analysis [18] reason for TOCTOU Attack is naming collision. No
naming rule or constraint is applied to a new permission
declaration. Moreover, permissions in Android are
represented as strings, and any two permissions with the
same name string are treated as equivalent even if they
belong to separate Applications.
© 2019 IJSRET
616
International Journal of Scientific Research & Engineering Trends
Volume 5, Issue 2, Mar-Apr-2019, ISSN (Online): 2395-566X
2. Dangerous Permissions - Dangerous Permissions can 5. Misuse of App permissions and failure of two
access critical resources of the mobile. Dangerous factor authentication- Due to misuse of various app
permissions can give the app access to the user's permissions, it is possible for various security threats.
confidential data. If app lists a normal permission in its Among various threats, it is possible for Android
manifest, the system grants the permission automatically. applications to read messages, send messages. SMS is a
If app list a dangerous permission, the user has to common and basic functionality in traditional mobile
explicitly give approval for the app for the successful and smart phone. All confidential information based on
installation of the app. Example: two-factor authentication has been sent as a text
Contacts message. For example, various banks, online websites,
Read_Contacts, Write_Contacts, etc., use two-factor authentications. The main objective
Get_Accounts of two-factor authentication is to increase the security
Location and integrity for the users and to avoid various security
Access_Fine_Location, attacks that are based on traditional username and
Access_Coarse_Location password approach. But, even this method fails, if
Sms malware installed in a smart phone or due to over claim
Send_Sms, Receive_Sms, Read_Sms, permission apps. If the hacker hacks username and
© 2019 IJSRET
617
International Journal of Scientific Research & Engineering Trends
Volume 5, Issue 2, Mar-Apr-2019, ISSN (Online): 2395-566X
password of the user using various hacking techniques, firmly watched, regularly in light of the fact that it's
the first level of authentication are compromised and viewed as a prized formula that makes shortage and
then the OTP (One Time Password)is being sent to the keeps the association aggressive. Such projects
user. If the application or malware that is being installed company limitations against changing the product or
in Smartphone then it is possiblefor the app or malware utilizing it in courses intended by the first makers.
to read messages and send theinformation to the hacker
without the knowledge ofthe user. So, even two-factor 5. Memory Randomization - It is a technique wherein
authentication fails. the information about the application is stored on the
disk in the random address which has been generated.
IV. COMPARISON OF ANDROID This reduces the security threats since malicious code
and attacker needs to find the exact location where the
AND IOS information is being stored. This technique is used by
1. Application Downloads -The Android applications both iOS and Android OS.
can be downloaded from google play store and unknown
sources. Android uses crowd sourcing [12] which is 6. Storage- Data of application is stored either in
based on user comments and rating of the app. If enough internal storage or external storage. For Android, the
users complain about the app, then it will be removed information can be stored in both built in storage and
and deactivated remotely. The iOS applications can be external storage. But, iOS does not support external
downloaded only from Ios App Store. It is not possible storage. It has only internal storage to reduce various
to download and install iOS applications other than App security threats and faster processing.
Store. All the applications available in iOS have been
properly checked for various security issues in the source
code and after verifying it then it is available in the App V.CONCLUSION
Store. Android is most widely used mobile operating system.
Improvising the security of an Android OS is very
2. Signing Technology- Self Signing [13] is used in important to safeguard the user's privacy and
Android. The Android discharge framework requires that confidential information. In this study, it was shown how
all applications introduced on client gadgets are carefully to avoid misusing app permissions.
marked with declarations whose private keys are held by
the Designer of the applications. The end or sements REFERENCES
permit the Android framework to recognize the creator [1] "Number of Google play store apps 2016 | statistic,"
of an application and set up trust connections amongst Statista, 2014. [Online]. Available:
designers and their applications. http://www.statista.com/statistics/266210/number-
ofavailable- applications-in-the-google-play-store.
The end or sements are not used to control which [2] "Smartphone users worldwide 2014-2020 | statistic,"
applications the client can and can't introduce. Code Statista, 2016. [Online]. Available:
signing [14] [15] used in iOS. It app assures users That it https://www.statista.com/statistics/330695/number-
is from a known source and the app hasn‟t been modified ofsmartphone- users-worldwide.
since it was last signed. Before publishing an app, the [3] M. S. Ahmad, N. E. Musa, R. Nadarajah, R. Hassan,
app has to be submitted to Apple Inc. for approval. and N. E. Othman, "Comparison between android
Apple signs the app after checking the code for any and iOS operating system in terms of security," 2013
malicious code. If an app is signed then, any changes to 8th International Conference on Information
the app can be easily tracked. Technology in Asia (CITA), Jul. 2013.
[4] A. Kaur and D. Upadhyay, "PeMo: Modifying
3. Inter process Communication- Android supports application‟s permissions and preventing information
intercrosses communication among its applications [15] stealing on smartphones," 2014 5th International
[16]. Apple iOS does not support inter-process Conference - Confluence The Next Generation
communication among its applications. Information Technology Summit (Confluence), Sep.
2014.
4. Open Source and Closed Source -Android is open [5] Z. Fang, W. Han, and Y. Li, "Permission based
source. In this guideline, open source programming Android security: Issues and countermeasures,"
implies the source code is made accessible on an all- Computers & Security, vol. 43, pp. 205–218, Jun.
inclusive level. The thought is to open up the product to 2014.
the general population, making a mass coordinated effort [6] Y. Zhou and X. Jiang, “Dissecting Android malware:
that outcomes in the product being continually upgraded, Characterization and evolution,” Proc. - IEEE Symp.
settled, enhanced, and developed. Apple‟s iOS is closed Secur. Priv., no. 4, pp. 95–109, 2012.
source. With closed source software, the source code is
© 2019 IJSRET
618
International Journal of Scientific Research & Engineering Trends
Volume 5, Issue 2, Mar-Apr-2019, ISSN (Online): 2395-566X
© 2019 IJSRET
619