Top Banner

of 35

Analysis and Research of System Security Based on ANDROID

Oct 13, 2015

Download

Documents

ShambuLingga

this is mainly about as the title described abt the analysis and research of android ..have fun guys
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • Analysis And Research OfSystem Security Based On

  • 3What is Android?

    Android is a softwarestack for mobile devicesthat includes an operatingsystem, middleware andkey applications.

  • Android SDK

    Uses Java programminglanguage

    Planned to run on different types of devices.

  • First phonelaunched HTC G1in 2008

    30+industrialpartners

    Softwareupdatesevery fewmonths

  • Android platform is based on Linuxtechnology.

    Composed of OS, user interface andapplication components.

    Its issuance breaks the monopoly status ofMicrosoft windows mobile OS and NokiasSymbian OS.

    Allows anyone to develop him ownapplications.

    User is likely to download and installmalicious softwares written by softwarehackers.

  • 7HTC G1,Droid,Tattoo

    Motorola Droid (X)

    Suno S880 Samsung Galaxy Sony Ericsson

    PHONES

  • 8Tablets

    Velocity Micro Cruz Gome FlyTouch Acer beTouch

    Dawa D7Toshiba AndroidSmartBook

    Cisco Android Tablet

  • Android PlatformArchitecture

    Android has built in tools.

    Android platform composed of Linuxkernel, system libraries, android runtime, application framework and so onfive parts.

  • Linux kernel

    Android relies on Linux 2.6 version It provides core system services

    security,memory management, processmanagement, network group, driven model.

    The core part is equivalent to an abstract levelbetween the hardware layer and other softwarein the systems.

  • Libraries

    Android includes a set of C/C++ libraries. Androids core libraries provide most of the

    function to the Java class libraries.

  • Android runtime Android runtime consists of two

    components. First, a set of core libraries. Second, the Virtual machine Dalvik. Java programs are received and

    translated by the VM Dalvik. Applications will be encapsulated in

    Dalvik. A VM is available for each and every

    program even if some programs arerunning in parallel.

  • Application Framework

    An application framework is a softwareframework that is used to implement a standardstructure of an application for a specific OS.

    Any application can publish its own features. These functions can be used by any other

    application.

  • Applications

    Applications are written in Java programminglanguage.

    The Android SDK tools compile the code into anandroid package,an archive file with a .apksuffix.

    The android software platform come with a set ofbasic applications.

    These applications can run simultaneously.

  • Important Features Application framework Dalvik VM Integrated browser Optimized graphics SQLite Media support GSM telephony Bluetooth,EDGE,3G and WiFi Camera,GPS,compass and accelerometer Rich development environment.

  • Android SystemSecurity

    In the default settings, no application haspermission to perform any operations thatwould adversely impact other applications,the OS, or the user.

    Androids security mechanism is mainlyreflected in 2 aspects:Android systemsecurity and data security.

  • Android system securityprotection

    Android system safety inherited the design ofLinux in the design ideology.

    In practice, each Android application runs in itsown process.

    In the OS, each application runs with a uniquesystem identity.

    Most of the security functions are provided bythe permission mechanism.

    Permission can be restricted to particularspecific process operations.

  • Android data securityprotection

    Android is privilegeseparated.

    Data security mainlyrelies on softwaresignaturemechanism.

  • It uses AndroidManifest.xml file When specified software services are

    called,the system first checks this file. To make use of protected features of the

    device, one must include inAndroidManifest.xml,one or more tags declaring thepermissions.

  • Example Applications

    Android anti theft security Junos pulse for Android Phone security alarm system

  • Android anti theft security

    The ultimate security for Android device

    in case it is ever lost or stolen.

  • FEATURES

    Accurate tracking Data encryption Spy camera activation Device lockdown

  • Some reasons why Android Anti-Theft Securityby Snuko is a must for your smartphone ortablet device: DEVICE LOCATION TRACKING DATA BACKUP ENCRYPTION AND HIDING OF DATA AUTOMATIC REGISTRATION SPY CAMERA SOUND AUDIBLE ALARM SIM CHANGE DETECTION UNAUTHORISED SIM INFORMATIONCAPTURE LOCK DOWN OF THE DEVICE SET YOUR OWN LOCK LOST DEVICE REPORT GENERATION

    Other supported platforms: WINDOWS, MAC,BLACKBERRY

  • PERMISSIONS SEND SMS MESSAGES HARDWARE CONTROLS

    TAKE PICTURES AND VIDEOS YOUR LOCATION

    FINE (GPS) LOCATION RECEIVE SMS READ SMS OR MMS EDIT SMS OR MMS FULL INTERNET ACCESS READ CONTACT DATA WRITE CONTACT DATA

  • PERMISSIONS READ PHONE STATE AND IDENTITY MODIFY/DELETE USB STORAGE CONTENTS

    MODIFY/DELETE SD CARD CONTENTS DISABLE KEYLOCK PREVENT TABLET/PHONE FROM SLEEPING CHANGE NETWORK CONNECTIVITY DISCOVER KNOWN ACCOUNTS VIEW WI-FI STATE VIEW NETWORK STATE DEFAULT

    POWER ON OR OFF

  • JUNOS PULSE FOR ANDROID

    Junos Pulse securesconnectivity to yourcorporate web-basedapplications viaJuniper NetworksSSL VPN gateways

  • FEATURES Safe, secure access to web-

    based applications,enterprise networks, andbookmarks

    Secure access to corporateemail through Outlook WebAccess.

    Real-time antivirusprotection.

    Background scanning of allnetwork traffic and interfacesfor malware, viruses andspyware.

  • Permissions DIRECTLY CALL PHONE NUMBERS YOUR LOCATION YOUR MESSAGES NETWORK COMMUNICATION YOUR PERSONAL INFORMATION PHONE CALLS STORAGE SYSTEM TOOLS YOUR ACCOUNTS NETWORK COMMUNICATION SYSTEM TOOLS

  • Phone Security Alarm System

    An alarm sound will play when a voice/noiseis too loud, on movement or on touch.

    Go!!! Fool your friends

  • Features High quality sounds Nice graphics All configurable Many different sounds etc.

  • PERMISSIONS

    HARDWARECONTROLS

    *RECORD AUDIO NETWORK

    COMMUNICATION*FULL INTERNET ACCESS