Front Inner Page - Volume 2 No.4 August 2015

  • » Back to Index

  • Title

    :

    Static Analysis for Extracting Permission Checks in Android Using Event Graph Technique

    Authors

    :

    Radha.S1, Sinduja.R2, Sowmya.P3, Ms.V.Brindha Devi4

    Keywords

    :

    Android, Dalvik byte code, Permission, Manifest, Permission gap

    Issue Date

    :

    August – 2015

    Abstract

    :

    Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android application is wrapped into an Android set file which contains the Dalvik byte code, data (pictures, sounds. etc.,) and a metadata file called the ―manifest. If the user wants to install an application, they have to approve all the permissions the developer has acknowledged in the manifest. The application is installed and receives group memberships, if all permissions are approved. The group memberships provoked to check the permissions at runtime only. Missing a permission origins the application to crash. Adding too many permission can make your application insecure. Malware using this code injection to access the declared permissions and control the unused permission to attain their malicious goal. Permission gap means they allowed more permissions than they need. Any permission gap results in insecure, suspicious run reliable applications. 

    Page(s)

    :

    1-3

    ISSN

    :

    2347- 4734

    Source

    :

    Vol. 2, No.4, August 2015

    Download

    :


  • » Back index