2023年全國碩士研究生考試考研英語一試題真題(含答案詳解+作文范文)_第1頁
已閱讀1頁,還剩15頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、字數(shù):英文 字數(shù):英文 2199 2199 單詞, 單詞,12157 12157 字符;中文 字符;中文 3837 3837 漢字 漢字出處: 出處:Karthick Karthick S , Binu Binu S . Android Android security security issues issues and and solutions[J] solutions[J] . International Internation

2、al Conference Conference on on Innovative Innovative Mechanisms Mechanisms for for Industry Industry Applications Applications (ICIMIA) (ICIMIA) . 2017:686-689. 2017:686-689.外文文獻 外文文獻 Android Security Issues and Solution

3、sAbstract Android operating system uses the permission-based model which allows Android applications to access user information, system information, device information and external resources of Smartphone. The develope

4、r needs to declare the permissions for the Android application. The user needs to accept these permissions for successful installation of an Android application. These permissions are declarations. At the time of install

5、ation, if the permissions are allowed by the user, the app can access resources and information anytime. It need not re- request for permissions again. Android OS is susceptible to various security attacks due to its wea

6、kness in security. This paper tells about the misuse of app permissions using Shared User ID, how two- factor authentications fail due to inappropriate and improper usage of app permissions using spyware, data theft in A

7、ndroid applications, security breaches or attacks in Android and analysis of Android, iOS and Windows operating system regarding its security.Keywords— Android; Permissions; Shared User ID; Security; Data Theft; Spyware;

8、 iOS; Windows.I.INTRODUCTIONA versatile working framework (OS) is programming that permits cell phones, of the paper.II.SECURITY ATTACKS IN ANDROIDA.Permission Escalation AttackIt allows a malicious application to collab

9、orate with other applications so as to access critical resources without requesting for corresponding permissions explicitly.B.Collision AttackAndroid supports shared user ID. It is a technique wherein two or more applic

10、ation share the same user id so that they can access the permissions which are granted to each other. For example, If application A has permissions to READ_CONTACTS, READ_PHONE_STATUS and B has permissions to READ_MESSAG

11、ES, LOCATION_ACCESS, if both the applications use the same user id SHAREDUSERID, then it is possible for application A to use the permissions granted to itself and the permissions granted to B. Similarly, it is possible

12、for application B to use the permissions granted to itself and the permissions granted to A. Every Android application has unique ID that is its package name. Android supports shared User ID. It is an attribute in Androi

13、dManifest.xml file. If this attribute assigned with the same value in two or more applications and if the same certificate signs these applications. They can access permissions granted to each other.Collision attack has

14、been classified as direct collision attack and indirect collision attack. A direct collision attack is where in application communicates directly. In Indirect collision attack application communicates via third party app

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論