SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Mohammed Alharbi
What is Android?
•Android is a software stack
for mobile devices that
includes an operating system


•Developed by Google and
Open Handset Alliance ‘OHA’


•Android platform using the
Java programming language


•Largest market share ,more than
Symbian and IOS
Application Components
• Activities: An activity represents a single screen with
  a user interface.

• Services: It is runs in the background .

• Broadcast receivers: Responds to system-wide
  broadcast announcements.

• Content providers: It is manages a shared set of
  application data.
Types of threats
• Malware apps:
 The idea is to lure users into downloading a free or heavily
 discounted game, get them to launch it, and clandestinely install
 malware behind their back.

• Drive-by exploits:
  The idea is to lure Android users to visit a website containing code
 that exploits a known weakness in a browser.
• Web Browser Vulnerability
  • available as of October 22, 2008.
  • Can affect any information browser have access on them.
• GappII
  • The service runs behind the scene and monitors the status
    of current phone screen.
  • can be remotely controlled to install additional apps without
    user’s knowledge.
• UpdtKiller
  • Upload victims’ personal information and retrieve commands
    from a remote control and command (C&C) server.
  • Block antivirus software processes so that viruses can’t be
    detected.
• UpdtBot
  • UpdtBot registers a remote Command and Control (C&C) server.
  • Can send text messages, make phone calls, and download and
    install apps.
Security Mechanism
                                 in Android
Sandboxes
 Each application is
 associated with a
 different UID.
 Every application runs
 in its own Linux process.
 Each process runs on
 its own Java VM.
 Application’s directory
 is only available to the
 application.
Security Mechanism
                                  in Android

Permissions
• Any application needs
  explicit permissions to
  access the components of
  other applications.


• These permissions are set
  by the package installer.
Security Mechanism in Android

Signatures
   Any Android application must be signed with a
    certificate whose private key is held by the
    developer.
   Identify the code's author.
   Detect if the application has changed.
   Establish trust between applications.
How to protect ourselves
• Download Apps Only from Trusted Sources

• Always check app permissions. Whenever you download
  or update an app, you get a list of permissions for it.

• Don't View Sensitive Information on Public Wi-Fi

• Put a malware and antivirus scanner on your phone.

• Protect Your Phone with a Password
Conclusion
• Android has a unique security model, which
  focuses on putting the user in control of the
  device.

• It is balance between security and usability.
Thank you ….

Más contenido relacionado

La actualidad más candente

Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsLacoon Mobile Security
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?Chetu
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITYyashwanthlavu
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paperJennifer Cataluña
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Blueboxer2014
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseItai Bass
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppAppknox
 

La actualidad más candente (20)

Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
BOTNET
BOTNETBOTNET
BOTNET
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
Lab 2
Lab 2Lab 2
Lab 2
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Code protection
Code protectionCode protection
Code protection
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Network security
Network securityNetwork security
Network security
 
Ankit dwivedi ad
Ankit dwivedi adAnkit dwivedi ad
Ankit dwivedi ad
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 

Destacado

Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Freek Onzia
 
J dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJ dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJennifer DLC
 
Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Freek Onzia
 
Creative and Effective Instructional Design
Creative and Effective Instructional DesignCreative and Effective Instructional Design
Creative and Effective Instructional DesigniLearn
 
Dunia keegoisan
Dunia keegoisanDunia keegoisan
Dunia keegoisannunnhalgii
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Ryutarou Satou
 
Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Freek Onzia
 
最短でスーパー MRになる方法
最短でスーパー MRになる方法最短でスーパー MRになる方法
最短でスーパー MRになる方法Ryutarou Satou
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Ryutarou Satou
 
Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Freek Onzia
 
Positief coachen
Positief coachenPositief coachen
Positief coachenFreek Onzia
 
Mungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaikMungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaiknunnhalgii
 
ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ครูหนุ่ม สอนศิลปะ
 
Positief coachen.kbkb def
Positief coachen.kbkb defPositief coachen.kbkb def
Positief coachen.kbkb defFreek Onzia
 

Destacado (19)

Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1
 
J dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJ dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classrooms
 
Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2
 
Teamcoaching
TeamcoachingTeamcoaching
Teamcoaching
 
Storyboard
StoryboardStoryboard
Storyboard
 
Creative and Effective Instructional Design
Creative and Effective Instructional DesignCreative and Effective Instructional Design
Creative and Effective Instructional Design
 
Dunia keegoisan
Dunia keegoisanDunia keegoisan
Dunia keegoisan
 
E41
E41E41
E41
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)
 
Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4
 
最短でスーパー MRになる方法
最短でスーパー MRになる方法最短でスーパー MRになる方法
最短でスーパー MRになる方法
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)
 
Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3
 
Presentationรวมภาพเด็ก
Presentationรวมภาพเด็กPresentationรวมภาพเด็ก
Presentationรวมภาพเด็ก
 
ตัวอย่างงานศิลปะ
ตัวอย่างงานศิลปะตัวอย่างงานศิลปะ
ตัวอย่างงานศิลปะ
 
Positief coachen
Positief coachenPositief coachen
Positief coachen
 
Mungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaikMungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaik
 
ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ
 
Positief coachen.kbkb def
Positief coachen.kbkb defPositief coachen.kbkb def
Positief coachen.kbkb def
 

Similar a Android security

android Security
android Security android Security
android Security darkC0de
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security ProgramDenim Group
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Security on android
Security on androidSecurity on android
Security on androidpk464312
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1Nikhil Kulkarni
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App DevelopementAayush Gupta
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)Justin Hoang
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfNomanKhan869872
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Stephan Chenette
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 

Similar a Android security (20)

android Security
android Security android Security
android Security
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Security on android
Security on androidSecurity on android
Security on android
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Android ppt
Android ppt Android ppt
Android ppt
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Android security

  • 1.
  • 3. What is Android? •Android is a software stack for mobile devices that includes an operating system •Developed by Google and Open Handset Alliance ‘OHA’ •Android platform using the Java programming language •Largest market share ,more than Symbian and IOS
  • 4. Application Components • Activities: An activity represents a single screen with a user interface. • Services: It is runs in the background . • Broadcast receivers: Responds to system-wide broadcast announcements. • Content providers: It is manages a shared set of application data.
  • 5.
  • 6. Types of threats • Malware apps: The idea is to lure users into downloading a free or heavily discounted game, get them to launch it, and clandestinely install malware behind their back. • Drive-by exploits: The idea is to lure Android users to visit a website containing code that exploits a known weakness in a browser.
  • 7. • Web Browser Vulnerability • available as of October 22, 2008. • Can affect any information browser have access on them. • GappII • The service runs behind the scene and monitors the status of current phone screen. • can be remotely controlled to install additional apps without user’s knowledge.
  • 8. • UpdtKiller • Upload victims’ personal information and retrieve commands from a remote control and command (C&C) server. • Block antivirus software processes so that viruses can’t be detected. • UpdtBot • UpdtBot registers a remote Command and Control (C&C) server. • Can send text messages, make phone calls, and download and install apps.
  • 9. Security Mechanism in Android Sandboxes Each application is associated with a different UID. Every application runs in its own Linux process. Each process runs on its own Java VM. Application’s directory is only available to the application.
  • 10. Security Mechanism in Android Permissions • Any application needs explicit permissions to access the components of other applications. • These permissions are set by the package installer.
  • 11. Security Mechanism in Android Signatures  Any Android application must be signed with a certificate whose private key is held by the developer.  Identify the code's author.  Detect if the application has changed.  Establish trust between applications.
  • 12. How to protect ourselves • Download Apps Only from Trusted Sources • Always check app permissions. Whenever you download or update an app, you get a list of permissions for it. • Don't View Sensitive Information on Public Wi-Fi • Put a malware and antivirus scanner on your phone. • Protect Your Phone with a Password
  • 13. Conclusion • Android has a unique security model, which focuses on putting the user in control of the device. • It is balance between security and usability.