This article is submitted to Smartphone 2010 (http://www.ftrg.org/smartphone2010/).

Abstract

Today smart phone’s malwares are deceptive enough to spoof itself as a legal mobile application. The front end service of Trojans is attractive enough to deceive mobile users. Mobile users download similar malwares without knowing their illegitimate background threat. Unlike other vendors, Android is an open source mobile operating system and hence it lacks a dedicated team to analyze the application code and decide its trustworthiness. We propose an augmented framework for Android that monitors the dynamic behavior of application during its execution. Our proposed architecture called Security Enhanced Android Framework (SEAF) validates the behavior of an application through its permissions exercising patterns. Based on the exercised permissions’ combination, the mobile user is intimated about the dangerous behavior of an application. We have implemented the proposed framework within Android software stack and ported it to device. Our initial investigation shows that our solution is practical enough to be used in the consumer market.

Reference Material

Module “PermissionManager”

PermissionManager has been integrated into Android application framework by performing following steps.

1. Copy project to /mydroid/packages/apps
2. Create Android.mk file inside project directory
3. Include an entry of project in /mydroid/build/target/product/generic.mk file
4. Compiled the code

The structure of policy file

The format of Android.mk file is shown below.

Documentation of policy evaluator class can be accessed at [policy evaluator class]

Pseudo code for Module “PolicyEvaluator”

Full source code of policy evaluator class can be accessed at [CodePolicyEvaluatorClass]

Screen shorts of implemented framework

Performance evaluation:

Leave a Reply


(Required)

(Required)