Malware and the Android OS
Abstract—If you take a quick visit to https://www.android.com , one of the first things you will see is the company’s claim that their operating system powers more than a billion devices across the globe. These devices include phones, tablets, watches, TVs, cars and more to come. Smartphones are used in many ways to include accessing sensitive documents, banking and controlling security systems. Various sources indicate that the smartphone market space is dominated by devices running the popular Android operating system. Two of the reasons why the Android OS is so popular is because of its open architecture and its application programming interface, or APIs. With such popularity, unscrupulous code developers see these devices as an opportunity to take advantage of unsuspecting users. Malware apps have drastically increased from 2010 to 2014 from a little over 1200 known variants to well over 1.5 million with over 90% of those designed for the Android OS. With such a large amount of malware and the majority of it designed for the Android OS, this paper will look at some of the various types of malware and the different methods of how they are deployed. We will also look at some of the methods employed to detect and defend against malware and the effectiveness of those methods.
Index Terms—Android, iOS, Smartphone, Security, iPhone, iPad, Virus, Malware
I. INTRODUCTION
N
OT so long ago we used cellular phones. We used those devices for the simple
Only a few short decades ago, the thought of nearly every person on the planet having a personal, cellular phone in their
Today’s technology-based society is plagued with an over abundance of mobile devices. These devices now control our homes, our transportation, and our
I chose the “mobile phone for my “ Different Drummer” project. Recently obtaining one for myself I am surprised how quickly I adjusted to our norms of society today, in fact I was a bit disgusted. I wanted to learn why we have changed this much and how. I wanted to learn where we were before this time period where nearly everyone can be contacted anywhere just through radio and digital signals. In the “older days” cell phones or mobile phones were as big as half a foot long and one fourth of a foot wide. Cell phones back then were also very scarce whereas, today nearly every adult teenager and some children have them. So how did we go from scarcity to abundance in such a short amount of time?
This article warns about the impending launch of viruses on mobile phones. The advent of Internet-enabled mobiles has increased the threats of mobile viruses exponentially. Examining the types of attacks and the impacts on the users. Even though published before it’s time, this article is still very relevant for modern concerns.
Malware on personal devices in a BYOD setting can be dangerous to the organization. Employees who accidently download malicious apps to their personal devices can potentially give hackers unauthorized access to corporate data. Coupled with other threats like jail-broken phones, preinstalled malware prior to shipping and mobile vulnerabilities can be a major nightmare to the IT department implementing BYOD (“Implementing BYOD,” 2012).
At first, I was going to analyze and write about smartphones, however I found it more efficient to write also about a particular smartphone to narrow it down from such a broad technological artifact, such as answering who designed it, what for, what their position and the impact they want to have on society was, and their future visions. Therefore, I chose the iPhone as the centerpiece of smartphones I will be analyzing and an emphasis on applications. However, some of this information is relevant and interchangeable to all other smartphones. IPhones and smartphones allow us to access constant information and offer it the way we want it, as it is completely customizable now to fit our learning style. They keep us organized, send information to us in different ways, even shape and offer solutions such as for politics, economies, problems whether individual ones or globally. Smartphones capitalize on shared knowledge and has opened the door to inventors and those who have the knowledge to make our world a more connected place and lives easier by sharing it with us to use. We are able to communicate with other people far off, through space-time compression or shrinking-space to gather news and information.
For past the century cell phones have been there for us helps us to our daily living there is no doubt that we use cellphones in our daily lives . “ Cell phones have enabled Americans to travel with technology everywhere they go . This allows many users to access and share the radio bandwidth and also allow calls to be made in a wide geographical area.” Base of experience I’ve been through a situation that requires to use my cell phones to get in contact with my family members. Back them when I used to live in the Philippines I remember times that I have to buy a prepaid card for me to able to talk to my mom through the phone ( US) and just going back at those times and comparing it now is so a lot different. Cell phones took a big impact in our society even anywhere. We now have video calls, facetime, snapchat and more applications that allows you to spend time with your love ones that’s overseas or across the world from you by just using Wifi. ll the time school work or whatever the instance is. Wherever you are or be you see phones everywhere no matter what it’s like something you should have every time you're out or going out
Considering a person’s personal data is one, if not the single most important assets he or she is in possession of, the processes involved in keeping the said data safe is crucial to avoid being a victim of malicious activities. Mobile device security should be at the top of a person’s list as a form of protecting personal data from the outside threats of malicious code infection, unauthorized data access, identity theft, fraud, and a compromise in the confidentiality, integrity and availability of a person's information.
Android is the world’s most popular mobile operating system based on the Linux kernel (Sangeetha Mukherjee, 2012). It is founded in October 2003 by Andy Rubin, Rich Miner, Nick Sears and Chris White. Android is initially developed by Android Inc. but bought by Google later in 2005. It is designed primarily for touch screen mobile devices such as smart phones and tablet computers (Allistair Lee, 2014). It includes an operating system, user-interface and applications – all of the software run on a mobile phone, but without the proprietary obstacles that have hindered mobile innovation.
The majority of people today, have easy access to some sort of technology. In fact, in January of 2014, it was recorded in a study, done by the Pew Research Center, that 90 percent of American adults own a cell
Cellphones are a considered a necessity in the modern world, it 's used to make phone calls, send messages, navigation, to check emails and even to post on social
DroidMat: Android Malware Detection through Manifest and API Calls Tracing Abstract—Recently, the threat of Android malware is spreading rapidly, especially those repackaged Android malware. Although understanding Android malware using dynamic analysis can provide a comprehensive view, it is still subjected to high cost in environment deployment and manual efforts in investigation.
Sales of smartphones and tablet devices are budding rapidly as they are becoming omnipresent. This is because of both the hardware and software features present in these devices. One of the main reasons of this popularity is the availability of the applications, ranging from high definition games to the office applications. According to the survey conducted [5], there are around 800 million iOS users in the world and Apple has gained 130 million iOS users in the year 2014 alone and there are currently around 1.2 million applications in the Appstore [6]. Because of this popularity and the growing number of iOS users in last four years, exploiting the iOS devices became a thing for the hackers.
Everyday more and more people are spending time on downloading mobile applications, since many applications are free, or at little cost. Nearly 11 billion mobile apps were downloaded in 2013, according to IDC (International Data Corporation) [1]. The personal data collection by those mobile apps can be highly valuable to the third-party companies. The report on mobile apps by Appthority showed that 88% of 100 free Android apps from Google Play Store collect IMEI’s, while 30% access user’s address books and 82% access location tracking. In addition, 57% free iOS (operating system for Apple) collect IMEI/UDID, while 26% access address books and 50% access location tracking (see Appendix A and B for information). Most mobile apps are convenient for users and have become more efficient and handful, such as checking bank account; sending and receiving emails, buying tickets, etc. Most of the time users don’t realize that those apps can open doors for malware stealing sensitive data and infect the mobile and internal networks, though. A number of enterprise IT leaders are concerned about employees bringing their own mobile device into organizations and connecting them to corporate networks, software, or accessing information, also called bring-your-own-device ( BYOD or BYO). BYOD can highly increase liability for those companies. Therefore, IT leaders are trying to fill those significant gaps by bringing forth Mobile Device Management (MDM), Mobile
Imagine a day in 1800 when someone would have said that we can talk to people miles away we can see them over a device people would have mocked the person saying the person might have gone insane. But see a scenario in today’s world its quite common to people to not only talk but also see a person over mobile phone, no matter how far he is away. Mobile phone is a boon in itself. Mobile phones have really changed the way of communications. In recent years mobile phones have evolved significantly. While the very first cellular phones only provided functionality for conducting phone calls, nowadays provide a rich variety of functionalities. Additional hardware capabilities like new sensors (e.g. for location) and touch screens as new input