SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Mohammed Alharbi
What is Android?
•Android is a software stack
for mobile devices that
includes an operating system


•Developed by Google and
Open Handset Alliance ‘OHA’


•Android platform using the
Java programming language


•Largest market share ,more than
Symbian and IOS
Application Components
• Activities: An activity represents a single screen with
  a user interface.

• Services: It is runs in the background .

• Broadcast receivers: Responds to system-wide
  broadcast announcements.

• Content providers: It is manages a shared set of
  application data.
Types of threats
• Malware apps:
 The idea is to lure users into downloading a free or heavily
 discounted game, get them to launch it, and clandestinely install
 malware behind their back.

• Drive-by exploits:
  The idea is to lure Android users to visit a website containing code
 that exploits a known weakness in a browser.
• Web Browser Vulnerability
  • available as of October 22, 2008.
  • Can affect any information browser have access on them.
• GappII
  • The service runs behind the scene and monitors the status
    of current phone screen.
  • can be remotely controlled to install additional apps without
    user’s knowledge.
• UpdtKiller
  • Upload victims’ personal information and retrieve commands
    from a remote control and command (C&C) server.
  • Block antivirus software processes so that viruses can’t be
    detected.
• UpdtBot
  • UpdtBot registers a remote Command and Control (C&C) server.
  • Can send text messages, make phone calls, and download and
    install apps.
Security Mechanism
                                 in Android
Sandboxes
 Each application is
 associated with a
 different UID.
 Every application runs
 in its own Linux process.
 Each process runs on
 its own Java VM.
 Application’s directory
 is only available to the
 application.
Security Mechanism
                                  in Android

Permissions
• Any application needs
  explicit permissions to
  access the components of
  other applications.


• These permissions are set
  by the package installer.
Security Mechanism in Android

Signatures
   Any Android application must be signed with a
    certificate whose private key is held by the
    developer.
   Identify the code's author.
   Detect if the application has changed.
   Establish trust between applications.
How to protect ourselves
• Download Apps Only from Trusted Sources

• Always check app permissions. Whenever you download
  or update an app, you get a list of permissions for it.

• Don't View Sensitive Information on Public Wi-Fi

• Put a malware and antivirus scanner on your phone.

• Protect Your Phone with a Password
Conclusion
• Android has a unique security model, which
  focuses on putting the user in control of the
  device.

• It is balance between security and usability.
Thank you ….

Contenu connexe

Tendances

Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsLacoon Mobile Security
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?Chetu
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITYyashwanthlavu
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for androidKazi Sarwar Hossain
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paperJennifer Cataluña
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Blueboxer2014
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseItai Bass
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppAppknox
 

Tendances (20)

Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
BOTNET
BOTNETBOTNET
BOTNET
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
Lab 2
Lab 2Lab 2
Lab 2
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Code protection
Code protectionCode protection
Code protection
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Network security
Network securityNetwork security
Network security
 
Ankit dwivedi ad
Ankit dwivedi adAnkit dwivedi ad
Ankit dwivedi ad
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
IntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile EnterpriseIntactPhone: Securing the Mobile Enterprise
IntactPhone: Securing the Mobile Enterprise
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 

En vedette

Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Freek Onzia
 
J dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJ dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJennifer DLC
 
Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Freek Onzia
 
Creative and Effective Instructional Design
Creative and Effective Instructional DesignCreative and Effective Instructional Design
Creative and Effective Instructional DesigniLearn
 
Dunia keegoisan
Dunia keegoisanDunia keegoisan
Dunia keegoisannunnhalgii
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Ryutarou Satou
 
Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Freek Onzia
 
最短でスーパー MRになる方法
最短でスーパー MRになる方法最短でスーパー MRになる方法
最短でスーパー MRになる方法Ryutarou Satou
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Ryutarou Satou
 
Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Freek Onzia
 
Positief coachen
Positief coachenPositief coachen
Positief coachenFreek Onzia
 
Mungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaikMungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaiknunnhalgii
 
ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ครูหนุ่ม สอนศิลปะ
 
Positief coachen.kbkb def
Positief coachen.kbkb defPositief coachen.kbkb def
Positief coachen.kbkb defFreek Onzia
 

En vedette (19)

Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1Vrijwilligersbeleid sessie1
Vrijwilligersbeleid sessie1
 
J dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classroomsJ dennis digital video cameras in today’s pre k 12 classrooms
J dennis digital video cameras in today’s pre k 12 classrooms
 
Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2Vrijwilligersbeleid sessie2
Vrijwilligersbeleid sessie2
 
Teamcoaching
TeamcoachingTeamcoaching
Teamcoaching
 
Storyboard
StoryboardStoryboard
Storyboard
 
Creative and Effective Instructional Design
Creative and Effective Instructional DesignCreative and Effective Instructional Design
Creative and Effective Instructional Design
 
Dunia keegoisan
Dunia keegoisanDunia keegoisan
Dunia keegoisan
 
E41
E41E41
E41
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)
 
Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4Vrijwilligersbeleid sessie4
Vrijwilligersbeleid sessie4
 
最短でスーパー MRになる方法
最短でスーパー MRになる方法最短でスーパー MRになる方法
最短でスーパー MRになる方法
 
Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)Mr夜ゼミ20120423(症例経過)
Mr夜ゼミ20120423(症例経過)
 
Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3Vrijwilligersbeleid sessie3
Vrijwilligersbeleid sessie3
 
Presentationรวมภาพเด็ก
Presentationรวมภาพเด็กPresentationรวมภาพเด็ก
Presentationรวมภาพเด็ก
 
ตัวอย่างงานศิลปะ
ตัวอย่างงานศิลปะตัวอย่างงานศิลปะ
ตัวอย่างงานศิลปะ
 
Positief coachen
Positief coachenPositief coachen
Positief coachen
 
Mungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaikMungkin ini adalah waktu yg terbaik
Mungkin ini adalah waktu yg terbaik
 
ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ ความหมายของศิลปะและขอบข่ายงามศิลปะ
ความหมายของศิลปะและขอบข่ายงามศิลปะ
 
Positief coachen.kbkb def
Positief coachen.kbkb defPositief coachen.kbkb def
Positief coachen.kbkb def
 

Similaire à Android security

android Security
android Security android Security
android Security darkC0de
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security ProgramDenim Group
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Security on android
Security on androidSecurity on android
Security on androidpk464312
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1Nikhil Kulkarni
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App DevelopementAayush Gupta
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)Justin Hoang
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfNomanKhan869872
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Stephan Chenette
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 

Similaire à Android security (20)

android Security
android Security android Security
android Security
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Security on android
Security on androidSecurity on android
Security on android
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Android ppt
Android ppt Android ppt
Android ppt
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Android security

  • 1.
  • 3. What is Android? •Android is a software stack for mobile devices that includes an operating system •Developed by Google and Open Handset Alliance ‘OHA’ •Android platform using the Java programming language •Largest market share ,more than Symbian and IOS
  • 4. Application Components • Activities: An activity represents a single screen with a user interface. • Services: It is runs in the background . • Broadcast receivers: Responds to system-wide broadcast announcements. • Content providers: It is manages a shared set of application data.
  • 5.
  • 6. Types of threats • Malware apps: The idea is to lure users into downloading a free or heavily discounted game, get them to launch it, and clandestinely install malware behind their back. • Drive-by exploits: The idea is to lure Android users to visit a website containing code that exploits a known weakness in a browser.
  • 7. • Web Browser Vulnerability • available as of October 22, 2008. • Can affect any information browser have access on them. • GappII • The service runs behind the scene and monitors the status of current phone screen. • can be remotely controlled to install additional apps without user’s knowledge.
  • 8. • UpdtKiller • Upload victims’ personal information and retrieve commands from a remote control and command (C&C) server. • Block antivirus software processes so that viruses can’t be detected. • UpdtBot • UpdtBot registers a remote Command and Control (C&C) server. • Can send text messages, make phone calls, and download and install apps.
  • 9. Security Mechanism in Android Sandboxes Each application is associated with a different UID. Every application runs in its own Linux process. Each process runs on its own Java VM. Application’s directory is only available to the application.
  • 10. Security Mechanism in Android Permissions • Any application needs explicit permissions to access the components of other applications. • These permissions are set by the package installer.
  • 11. Security Mechanism in Android Signatures  Any Android application must be signed with a certificate whose private key is held by the developer.  Identify the code's author.  Detect if the application has changed.  Establish trust between applications.
  • 12. How to protect ourselves • Download Apps Only from Trusted Sources • Always check app permissions. Whenever you download or update an app, you get a list of permissions for it. • Don't View Sensitive Information on Public Wi-Fi • Put a malware and antivirus scanner on your phone. • Protect Your Phone with a Password
  • 13. Conclusion • Android has a unique security model, which focuses on putting the user in control of the device. • It is balance between security and usability.