SlideShare une entreprise Scribd logo
1  sur  35
Application Security Based
On
By- Ravishankar Kumar
95511101
Overview
• Why care about mobile security?
• What is Android?
• How do I develop on Android?
o Android Market
• What about Security?
o Cornerstones of Android security
Prevention
Minimization
Detection
Reaction
Overview
• Why care about mobile security?
• What is Android?
• How do I develop on Android?
o Android Market
• What about Security?
o Cornerstones of Android security
Prevention
Minimization
Detection
Reaction
Some Statistics
→Android powers hundreds of millions of mobile
devices in more than 190 countries around the world.
→Android users download more than 1.5 billion apps
and games from Google Play each month.
→Easily optimize a single binary for phones, tablets,
and other devices.
→Google Play is the premier marketplace for
selling and distributing Android apps.
Factor care about mobile security
1.Android malware
→ It can use runtime environments like
Java virtual machine or the .NET Framework.
→ It sends personal information to unauthorised third parties.
→ It can partially damage the device, or delete or modify
data on the device.
→ It can spread through proximate devices using Wi-Fi,
Bluetooth and infrared.
→ It can also spread using remote networks such as telephone calls
or SMS or emails.
Factor care about mobile security
2.Ad Networks and Permissions
→Attackers access to a phone number or device ID lets advertisers
track your movements between apps, and build up complicated profiles.
→Less reputable ad networks may also try to access your address
book in order to send ads to other people, or even change your ringtone to
an advertisement.
→The attacker can easily force the smartphone to make phone calls.
3. Loss and Theft
→Reports claim that 1.6 million Americans had their phone stolen in
2013.
Mobile Security Matures
We are now seeing attacks against all layers of
mobile infrastructure:
• Applications
• Platform
• OS
• Baseband
• Network
Mobile devices must be treated as fully fledged computers.
Overview
• Why care about mobile security?
• What is Android?
• How do I develop on Android?
o Android Market
• What about Security?
o Cornerstones of Android security
Prevention
Minimization
Detection
Reaction
Introducing Android
» Android is open source and Google releases the code under
the Apache License.
Source code at http://source.android.com
» Any developer can use
SDK at http://developer.android.com
» Third party apps available on Google Play
Download at http://play.google.com/store
»Official Website of Android
More at http://www.android.com
Android Version
New Version
Usage On
The Android Technology Stack
• Linux kernel
• Relies upon 90+ open source libraries
o Integrated Web Kit based browser
o SQLite for structured data storage
o OpenSSL
o Bouncy Castle
o libc based on OpenBSD
o Apache Harmony
o Apache Http Client
• Supports common sound, video and image codecs
• API support for handset I/O
o Bluetooth, EDGE, 3G, wifi
o Camera, Video, GPS, compass, accelerometer,
sound, vibrator
Overview
• Why care about mobile security?
• What is Android?
• How do I develop on Android?
o Android Market
• What about Security?
o Android security Issue
oStoring Data
oUsing Permission
oCryptography
Example Application
Android Security
Some of the core security features that help you build secure apps
include:
»The Android Application Sandbox, which isolates your app data and
code execution from other apps.
»An application framework with robust implementations of common
security functionality such as cryptography, permissions, and secure
IPC.
» An encrypted file system that can be enabled to protect data on lost
or stolen devices.
» User-granted permissions to restrict access to system features and
user data.
» Application-defined permissions to control application data on a
per-app basis.
Android Application Sandbox
Storing Data
The most common security concern for an application on Android is
whether the data that you save on the device is accessible to other
apps.
There are three fundamental ways to save data on the device:
1. Using internal storage
» By default, files that you create on internal storage are accessible
only to your app.
» To provide additional protection for sensitive data, you might
choose to encrypt local files using a key that is not directly accessible to
the application.
2. Using external storage
» Files created on external storage, such as SD Cards, are globally
readable and writable.
» As with data from any untrusted source, you should perform input
validation when handling data from external storage.
Storing Data Cont..
3. Using content providers
»Content providers offer a structured storage mechanism that can
be limited to your own application or exported to allow access by
other applications.
» When creating a ContentProvider that will be exported for use
by other applications, you can specify a single permission for reading
and writing, or distinct permissions for reading and writing within the
manifest.
Using Permissions
Because Android sandboxes applications from each other, applications
must explicitly share resources and data.
Requesting Permissions
» If it's possible to design your application in a way that does not
require any permissions, that is preferable.
» addition to requesting permissions, your application can use the
<permissions> to protect IPC that is security sensitive and will be
exposed to other applications, such as a ContentProvider.
Creating Permissions
» Creating a new permission is relatively uncommon for most
applications.
Using Permission Cont..
Creating Permissions
» If you must create a new permission, consider whether you can
accomplish your task with a "signature" protection level.
» If you create a permission with the "dangerous" protection level, there
are a number of complexities that you need to consider:
1. The permission must have a string that concisely expresses to a user
the security decision they will be required to make.
2.The permission string must be localized to many different languages.
3.Users may choose not to install an application because a permission
is confusing or perceived as risky.
4.Applications may request the permission when the creator of the
permission has not been installed.
Using Cryptography
» Android provides a wide array of algorithms for protecting data
using cryptography.
» Use existing cryptographic algorithms such as those in the
implementation of AES or RSA provided in the Cipher class.
» Use a secure random number generator, SecureRandom, to
initialize any cryptographic keys, KeyGenerator.
Overview
• Why care about mobile security?
• What is Android?
• How do I develop on Android?
o Android Market
• What about Security?
o Cornerstones of Android security
 Prevention
 Minimization
 Detection
 Reaction
Example Application
Example Applications
• Lookout Security & Antivirus
• App Lock
• Phone security alarm system
Lookout Security & Antivirus
Lookout Security & Antivirus FREE Features:
Lookout Security & Antivirus
Lookout Security & Antivirus FREE Features:
►SECURITY & ANTIVIRUS
• App Scanning: Continuous, over-the-air
protection from viruses, malware,
adware and spyware
Lookout Security & Antivirus
Lookout Security & Antivirus FREE Features:
►SECURITY & ANTIVIRUS
• App Scanning: Continuous, over-the-air
protection from viruses, malware,
adware and spyware
►FIND MY PHONE
• Locate & Scream: Map the location of
your device and make it sound an alarm
• Signal Flare: Automatically save your
phone's location when the battery is low.
Lookout Security & Antivirus
Lookout Security & Antivirus FREE Features:
►SECURITY & ANTIVIRUS
• App Scanning: Continuous, over-the-air
protection from viruses, malware,
adware and spyware
►FIND MY PHONE
• Locate & Scream: Map the location of
your device and make it sound an alarm
• Signal Flare: Automatically save your
phone's location when the battery is low.
►BACKUP & DOWNLOAD
• Contact Backup: Save a copy of your
Google contacts
Lookout Security & Antivirus
App Lock
App Lock Features:
» AppLock can lock SMS, Contacts, Gmail, Facebook,
Gallery, Market, Settings.
App Lock
App Lock Features:
» AppLock can lock SMS, Contacts, Gmail, Facebook,
Gallery, Market, Settings.
» AppLock empowers you to control photo and
video access.
App Lock
App Lock Features:
» AppLock can lock SMS, Contacts, Gmail, Facebook,
Gallery, Market, Settings.
» AppLock empowers you to control photo and
video access.
» With AppLock, only you can see your hidden
pictures. Privacy made easy!
App Lock
App Lock Features:
» AppLock can lock SMS, Contacts, Gmail, Facebook,
Gallery, Market, Settings.
» AppLock empowers you to control photo and
video access.
» With AppLock, only you can see your hidden
pictures. Privacy made easy!
» Selected pictures vanish from your photo
gallery, and stay locked behind an
easy-to-use PIN pad.
App Lock
Analysis and research of system security based on android
Analysis and research of system security based on android

Contenu connexe

Tendances

Android Security
Android SecurityAndroid Security
Android SecurityArqum Ahmad
 
Android Security
Android SecurityAndroid Security
Android SecurityLars Jacobs
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Developmenthackstuff
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applicationsh4oxer
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
 
Смирнов Александр, Security in Android Application
Смирнов Александр, Security in Android ApplicationСмирнов Александр, Security in Android Application
Смирнов Александр, Security in Android ApplicationSECON
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsBlrDroid
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...Consulthinkspa
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration TestingSubho Halder
 
Bypassing the Android Permission Model
Bypassing the Android Permission ModelBypassing the Android Permission Model
Bypassing the Android Permission ModelGeorgia Weidman
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security WorkshopOWASP
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 

Tendances (20)

Android Security
Android SecurityAndroid Security
Android Security
 
Android Security
Android SecurityAndroid Security
Android Security
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Android Security
Android SecurityAndroid Security
Android Security
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Development
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
Android security
Android securityAndroid security
Android security
 
Смирнов Александр, Security in Android Application
Смирнов Александр, Security in Android ApplicationСмирнов Александр, Security in Android Application
Смирнов Александр, Security in Android Application
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Bypassing the Android Permission Model
Bypassing the Android Permission ModelBypassing the Android Permission Model
Bypassing the Android Permission Model
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
Android system security
Android system securityAndroid system security
Android system security
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 

En vedette

Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Androidsecurityxploded
 
Online unlocker - an android app
Online unlocker - an android appOnline unlocker - an android app
Online unlocker - an android appAditya Undirwadkar
 
[WWW2012] analyzing spammers' social networks for fun and profit
[WWW2012] analyzing spammers' social networks for fun and profit[WWW2012] analyzing spammers' social networks for fun and profit
[WWW2012] analyzing spammers' social networks for fun and profitChih-Hsuan Kuo
 
APIs Are Forever - How to Design Long-Lasting APIs
APIs Are Forever - How to Design Long-Lasting APIsAPIs Are Forever - How to Design Long-Lasting APIs
APIs Are Forever - How to Design Long-Lasting APIsLaunchAny
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesŃirjhor Ánjum
 
No one puts java in the container
No one puts java in the containerNo one puts java in the container
No one puts java in the containerkensipe
 
Shared information systems
Shared information systemsShared information systems
Shared information systemsHimanshu
 
Android secure offline storage - CC Mobile
Android secure offline storage - CC MobileAndroid secure offline storage - CC Mobile
Android secure offline storage - CC MobileJWORKS powered by Ordina
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAvinash Birnale
 
CORPORATE LEADERSHIP Roles & Responsibilities.
CORPORATE LEADERSHIP Roles & Responsibilities.CORPORATE LEADERSHIP Roles & Responsibilities.
CORPORATE LEADERSHIP Roles & Responsibilities.Anusha Chavan
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...securityxploded
 
Clean architecture on Android
Clean architecture on AndroidClean architecture on Android
Clean architecture on AndroidGDG Odessa
 

En vedette (16)

Android ppt
Android ppt Android ppt
Android ppt
 
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Android
 
Online unlocker - an android app
Online unlocker - an android appOnline unlocker - an android app
Online unlocker - an android app
 
App Lock
App LockApp Lock
App Lock
 
[WWW2012] analyzing spammers' social networks for fun and profit
[WWW2012] analyzing spammers' social networks for fun and profit[WWW2012] analyzing spammers' social networks for fun and profit
[WWW2012] analyzing spammers' social networks for fun and profit
 
APIs Are Forever - How to Design Long-Lasting APIs
APIs Are Forever - How to Design Long-Lasting APIsAPIs Are Forever - How to Design Long-Lasting APIs
APIs Are Forever - How to Design Long-Lasting APIs
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
No one puts java in the container
No one puts java in the containerNo one puts java in the container
No one puts java in the container
 
Shared information systems
Shared information systemsShared information systems
Shared information systems
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Securing Android
Securing AndroidSecuring Android
Securing Android
 
Android secure offline storage - CC Mobile
Android secure offline storage - CC MobileAndroid secure offline storage - CC Mobile
Android secure offline storage - CC Mobile
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
CORPORATE LEADERSHIP Roles & Responsibilities.
CORPORATE LEADERSHIP Roles & Responsibilities.CORPORATE LEADERSHIP Roles & Responsibilities.
CORPORATE LEADERSHIP Roles & Responsibilities.
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
 
Clean architecture on Android
Clean architecture on AndroidClean architecture on Android
Clean architecture on Android
 

Similaire à Analysis and research of system security based on android

android Security
android Security android Security
android Security darkC0de
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration TestingSurabaya Blackhat
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security ProgramDenim Group
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
Security on android
Security on androidSecurity on android
Security on androidpk464312
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfNomanKhan869872
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1Nikhil Kulkarni
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App DevelopementAayush Gupta
 

Similaire à Analysis and research of system security based on android (20)

Mobile security
Mobile securityMobile security
Mobile security
 
android Security
android Security android Security
android Security
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration Testing
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Security on android
Security on androidSecurity on android
Security on android
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Android
AndroidAndroid
Android
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
 

Dernier

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Analysis and research of system security based on android

  • 1. Application Security Based On By- Ravishankar Kumar 95511101
  • 2. Overview • Why care about mobile security? • What is Android? • How do I develop on Android? o Android Market • What about Security? o Cornerstones of Android security Prevention Minimization Detection Reaction
  • 3. Overview • Why care about mobile security? • What is Android? • How do I develop on Android? o Android Market • What about Security? o Cornerstones of Android security Prevention Minimization Detection Reaction
  • 4. Some Statistics →Android powers hundreds of millions of mobile devices in more than 190 countries around the world. →Android users download more than 1.5 billion apps and games from Google Play each month. →Easily optimize a single binary for phones, tablets, and other devices. →Google Play is the premier marketplace for selling and distributing Android apps.
  • 5. Factor care about mobile security 1.Android malware → It can use runtime environments like Java virtual machine or the .NET Framework. → It sends personal information to unauthorised third parties. → It can partially damage the device, or delete or modify data on the device. → It can spread through proximate devices using Wi-Fi, Bluetooth and infrared. → It can also spread using remote networks such as telephone calls or SMS or emails.
  • 6. Factor care about mobile security 2.Ad Networks and Permissions →Attackers access to a phone number or device ID lets advertisers track your movements between apps, and build up complicated profiles. →Less reputable ad networks may also try to access your address book in order to send ads to other people, or even change your ringtone to an advertisement. →The attacker can easily force the smartphone to make phone calls. 3. Loss and Theft →Reports claim that 1.6 million Americans had their phone stolen in 2013.
  • 7. Mobile Security Matures We are now seeing attacks against all layers of mobile infrastructure: • Applications • Platform • OS • Baseband • Network Mobile devices must be treated as fully fledged computers.
  • 8. Overview • Why care about mobile security? • What is Android? • How do I develop on Android? o Android Market • What about Security? o Cornerstones of Android security Prevention Minimization Detection Reaction
  • 9. Introducing Android » Android is open source and Google releases the code under the Apache License. Source code at http://source.android.com » Any developer can use SDK at http://developer.android.com » Third party apps available on Google Play Download at http://play.google.com/store »Official Website of Android More at http://www.android.com
  • 13. The Android Technology Stack • Linux kernel • Relies upon 90+ open source libraries o Integrated Web Kit based browser o SQLite for structured data storage o OpenSSL o Bouncy Castle o libc based on OpenBSD o Apache Harmony o Apache Http Client • Supports common sound, video and image codecs • API support for handset I/O o Bluetooth, EDGE, 3G, wifi o Camera, Video, GPS, compass, accelerometer, sound, vibrator
  • 14. Overview • Why care about mobile security? • What is Android? • How do I develop on Android? o Android Market • What about Security? o Android security Issue oStoring Data oUsing Permission oCryptography Example Application
  • 15. Android Security Some of the core security features that help you build secure apps include: »The Android Application Sandbox, which isolates your app data and code execution from other apps. »An application framework with robust implementations of common security functionality such as cryptography, permissions, and secure IPC. » An encrypted file system that can be enabled to protect data on lost or stolen devices. » User-granted permissions to restrict access to system features and user data. » Application-defined permissions to control application data on a per-app basis.
  • 17. Storing Data The most common security concern for an application on Android is whether the data that you save on the device is accessible to other apps. There are three fundamental ways to save data on the device: 1. Using internal storage » By default, files that you create on internal storage are accessible only to your app. » To provide additional protection for sensitive data, you might choose to encrypt local files using a key that is not directly accessible to the application. 2. Using external storage » Files created on external storage, such as SD Cards, are globally readable and writable. » As with data from any untrusted source, you should perform input validation when handling data from external storage.
  • 18. Storing Data Cont.. 3. Using content providers »Content providers offer a structured storage mechanism that can be limited to your own application or exported to allow access by other applications. » When creating a ContentProvider that will be exported for use by other applications, you can specify a single permission for reading and writing, or distinct permissions for reading and writing within the manifest.
  • 19. Using Permissions Because Android sandboxes applications from each other, applications must explicitly share resources and data. Requesting Permissions » If it's possible to design your application in a way that does not require any permissions, that is preferable. » addition to requesting permissions, your application can use the <permissions> to protect IPC that is security sensitive and will be exposed to other applications, such as a ContentProvider. Creating Permissions » Creating a new permission is relatively uncommon for most applications.
  • 20. Using Permission Cont.. Creating Permissions » If you must create a new permission, consider whether you can accomplish your task with a "signature" protection level. » If you create a permission with the "dangerous" protection level, there are a number of complexities that you need to consider: 1. The permission must have a string that concisely expresses to a user the security decision they will be required to make. 2.The permission string must be localized to many different languages. 3.Users may choose not to install an application because a permission is confusing or perceived as risky. 4.Applications may request the permission when the creator of the permission has not been installed.
  • 21. Using Cryptography » Android provides a wide array of algorithms for protecting data using cryptography. » Use existing cryptographic algorithms such as those in the implementation of AES or RSA provided in the Cipher class. » Use a secure random number generator, SecureRandom, to initialize any cryptographic keys, KeyGenerator.
  • 22. Overview • Why care about mobile security? • What is Android? • How do I develop on Android? o Android Market • What about Security? o Cornerstones of Android security  Prevention  Minimization  Detection  Reaction Example Application
  • 23. Example Applications • Lookout Security & Antivirus • App Lock • Phone security alarm system
  • 24. Lookout Security & Antivirus Lookout Security & Antivirus FREE Features:
  • 25. Lookout Security & Antivirus Lookout Security & Antivirus FREE Features: ►SECURITY & ANTIVIRUS • App Scanning: Continuous, over-the-air protection from viruses, malware, adware and spyware
  • 26. Lookout Security & Antivirus Lookout Security & Antivirus FREE Features: ►SECURITY & ANTIVIRUS • App Scanning: Continuous, over-the-air protection from viruses, malware, adware and spyware ►FIND MY PHONE • Locate & Scream: Map the location of your device and make it sound an alarm • Signal Flare: Automatically save your phone's location when the battery is low.
  • 27. Lookout Security & Antivirus Lookout Security & Antivirus FREE Features: ►SECURITY & ANTIVIRUS • App Scanning: Continuous, over-the-air protection from viruses, malware, adware and spyware ►FIND MY PHONE • Locate & Scream: Map the location of your device and make it sound an alarm • Signal Flare: Automatically save your phone's location when the battery is low. ►BACKUP & DOWNLOAD • Contact Backup: Save a copy of your Google contacts
  • 28. Lookout Security & Antivirus
  • 29. App Lock App Lock Features: » AppLock can lock SMS, Contacts, Gmail, Facebook, Gallery, Market, Settings.
  • 30. App Lock App Lock Features: » AppLock can lock SMS, Contacts, Gmail, Facebook, Gallery, Market, Settings. » AppLock empowers you to control photo and video access.
  • 31. App Lock App Lock Features: » AppLock can lock SMS, Contacts, Gmail, Facebook, Gallery, Market, Settings. » AppLock empowers you to control photo and video access. » With AppLock, only you can see your hidden pictures. Privacy made easy!
  • 32. App Lock App Lock Features: » AppLock can lock SMS, Contacts, Gmail, Facebook, Gallery, Market, Settings. » AppLock empowers you to control photo and video access. » With AppLock, only you can see your hidden pictures. Privacy made easy! » Selected pictures vanish from your photo gallery, and stay locked behind an easy-to-use PIN pad.