Preview

Android Hacking and Security Research Paper

Powerful Essays
Open Document
Open Document
1705 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Android Hacking and Security Research Paper
Android Hacking and Security

Donna McDuffey
Kentucky State University Graduate Student
Nicholasville, KY
859-382-3480
donna.mcduffey@kysu.edu

ABSTRACT
An introduction to the security risks to android users, how hackers target these platform devices, and how users can better protect themselves and sensitive data.
Categories and Subject Descriptors
Introduction
Android Platform introduction
Android Security Features and Shortcomings
Types of Android Hacking
Android Security Measures to Prevent Hacking
General Terms
Android, Android Hacking, Android Security
Keywords
Android, security, android security, hacking, android hacking, user settings, personal data and mobile devices, mobile device security, open source, wireless security.
1. INTRODUCTION
In this research paper, I will review security issues for mobile devices using the Android platform specifically. I’ll detail threats and vulnerabilities and how android device users can better secure their devices and data.
2. ANDROID BASICS
Android is a mobile operating system. The OS was developed by Android, Inc. who was eventually bought by Google. Android is an open source platform, which means the OS can be customized by anyone. Anyone can develop for Android and all the developer tools are free to access and download.
2.1 Android vs. Other Mobile OS
There are different types of mobile operating systems. Android and iOS by Apple, are the two main offerings on the market today. As of 2013 over 60% of all smart phones purchased were android devices [8]. Windows is now producing a mobile OS that resembles the desktop version their users are accustomed to. Currently, there are not many offerings for devices or applications, although it is an emerging market. The unique aspect of Android is that it is an open source operating system, which anyone with the right tools can customize.

2.2 Android Rooting and Modification
Often, individual mobile service providers and manufacturers modify the OS on the devices



References: [1]Indiana University. 2011. “How Can I Protect Data on my Mobile Device.” Web. https://kb.iu.edu/d/bcnh. [2]Lookout Mobile. 2014. “Mobile Security Technology”. Web. https://www.lookout.com/mobile-security-technology/. [3]Mittal, S. 2014. InfoSec Institute. “Android Application Security Testing.” Web. 17 February 2014. http://resources.infosecinstitute.com/android-application-security-testing-guide-part-1/. [4]Mossman, M. 2011. InfoSec Institute. “Android Security: Taking Control.” Web. 11 May 2011. http://resources.infosecinstitute.com/android-security-take-control/ . [5]Mossman, M. 2011. InfoSec Institute. “Android Security: Tips and Settings.” Web [6] Paul, I. 2013. PCWorld. “Security to go: Three tips to keep your mobile data safe.” Web. 15 October 2013. http://www.pcworld.com/article/2052810/security-to-go-three-tips-to-keep-your-mobile-data-safe. /. [7]Taous, T. 2014. Sitepoint. “A Brief Guide to Rooting Android.” Web. 5 June 2014. http://www.sitepoint.com/brief-guide-rooting-android/. [8]Violino, B. 2013. Infoworld. “A Clear-Eyed Guide to Android’s Actual Security Risks”. Web. 9 December 2014. [9]Wikipedia. 2014. “Rooting (Android OS)”. Web. Accessed 19 November 2014. http://en.wikipedia.org/wiki/Rooting_%28Android_OS%29.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <http://www.infoworld.com/d/mobile-technology/clear-eyed-guide-androids-actual-security-risks-232034>.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136…

    • 1241 Words
    • 4 Pages
    Better Essays
  • Better Essays

    android

    • 1051 Words
    • 5 Pages

    term paper we have discuss the history of Android, the architecture on which it works? Various application developments like android market. The various GUI android challenges faced by…

    • 1051 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Smartphone’s are extremely popular. Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location based applications. There were surveys done by a nonprofit global information security association called…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Iphone Security Issues

    • 469 Words
    • 2 Pages

    Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification.…

    • 469 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Friedman, J., & Hoffman, D. V. (2008). Protecting Data on mobile Devices: A Taxonomy of Security Threats to mobile Computing and Review of Applicable Defenses. Information knowledge Systems Management, 7(1/2), 159-180.…

    • 1179 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    It has a range of products available to cover different needs, from premium services to businesses and basic antivirus software for home use. The most popular products from the security retailer include the following:…

    • 964 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Over the last decade, electronic-based companies such as Samsung and Apple have collaborated with cellular-phone carriers, and have studied the average consumer to find endless ways to improve the cellular phone. As a result, the smart phone was born. With their ability to provide users with instant access to communication, entertainment, Internet access, calendar, news, social media, and much more, the smart phone revolutionized and shifted the path of modern technology. In 2006, Apple began this revolution with their release of the iPhone. Being the first proper smart phone, many other companies attempted to mimic the unbeatable features and technology that Apple had included with the iPhone. Though many had failed in doing so, Google managed to keep up with the iPhone with their Android software. Soon enough, Google’s Android software became the dominant smart phone based software for smart phones not manufactured by Apple. Because of this, Android phones had become just as popular as iPhones. This paper will explore the similarities and differences between both Apple’s iPhone and Google’s Android.…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Abstract—Distributed system are becoming a paramount important nowadays. The new technology era become one of high impact in global market. Recently, mobile code has been one of the technological answer of smart technology problem. In this work is explain about mobile code in distributed application with some examples of application and also security issues about the mobile code itself.…

    • 1109 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    mobile

    • 2906 Words
    • 12 Pages

    Post-exploitation Android introduction Android security model Methodology Toward a backdoor without permission Context and objectives Why Android? Most used mobile OS…

    • 2906 Words
    • 12 Pages
    Powerful Essays