Android Application Security Case Study

1618 Words4 Pages

2.2 Android application security threats
In the study of [5] – A study of Android Application Security, by William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri have used four approaches to evaluate the source codes of several Android applications in order to identify the security failures in the application [5]:
• Control flow analysis – consider the constraints on the sequence of actions in a program, where some of them are considered as errors. Ex: sending unprotected data through intents without specifying the target component, which results the information leakage.
• Data flow analysis – declarative specification of problematic data flows in the program. Ex: The Android user’s phone identifiers, such as phone number, IMEI number …show more content…

It allows access to the low-level OS functionality and the OS protection. Also, some users may like to install the modified operating systems on their devices, which only possible with privileged access and it can introduce the high risk of malware infection.[2][6]

2.2 Android application security threats
In the study of [5] – A study of Android Application Security, by William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri have used four approaches to evaluate the source codes of several Android applications in order to identify the security failures in the application [5]:
Control flow analysis – consider the constraints on the sequence of actions in a program, where some of them are considered as errors. Ex: sending unprotected data through intents without specifying the target component, which results the information leakage.
Data flow analysis – declarative specification of problematic data flows in the program. Ex: The Android user’s phone identifiers, such as phone number, IMEI number (device id), IMSI (subscriber id), ICC-ID (SIM card serial number) should never leave the

Open Document