Filters








9,262 Hits in 5.0 sec

Analysis of Secure Key Storage Solutions on Android

Tim Cooijmans, Joeri de Ruiter, Erik Poll
2014 Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices - SPSM '14  
Secure key storage solutions: AndroidKeyStore • Available since 4.3 • Service running in background • No access to key • Hardware-based secure storage • Qualcomm devices • Texas Instruments  ...  * User-consent * AndroidKeyStore • Storage handled by service in Android • Two files on filesystem • Key parameters and encrypted private key 10101_USRPKEY_TestKeyPair • Certificate 10101  ... 
doi:10.1145/2666620.2666627 dblp:conf/ccs/CooijmansRP14 fatcat:abu6kh6ncfbrxbjdxxhvqqnysi

Secure Storage of Data on Android Based Devices

Poonguzhali P., Prajyot Dhanokar, M. K. Chaithanya, Mahesh U. Patil
2016 International Journal of Engineering and Technology  
In order to address this issue, a secure means of storage for Android platform is developed namely Secure Storage.  ...  In this paper, we highlight some of the mobile device security threats, the importance of securing data and brief the secure storage component.  ...  PERFORMANCE ANALYSIS OF SECURE STORAGE APPLICATION The Secure Storage application was experimented on three different mobile devices of varied configurations for calculating the time taken by application  ... 
doi:10.7763/ijet.2016.v6.880 fatcat:jf6sjic2urepjpvsrcafp3zqtu

A Survey on Permission based Malware Detection in Android Applications

Sunali Jogsan, Gujarat Technological University - Graduate School of Engineering Technology
2020 International Journal of Engineering Research and  
Nowadays Android application is widely used by the users and performs many different types of activities. So the android platform has become a primary target of attackers.  ...  The android operating system is basically for mobiles and is quickly gaining the market share, where most of the smartphones and tablets either released or set to be released.  ...  Android storage model options and security also shown in this paper. There is a set of identified threats on Android data storage with the solutions.  ... 
doi:10.17577/ijertv9is040774 fatcat:omddrxxr3nhovgwbz4qpiofgtq

Improved Key Distributed Storage Mechanism Based on Android System

Yuxi Lin, Xingjun Wang
2015 Lecture Notes on Information Theory  
This paper presents an improved key distributed storage solution to protect the private key based on Android system.  Protection Technologies.  ...  Copyright protection of products and privacy protection of Android users is becoming a matter of growing concern, Researchers continue to improve the security of Android, and Digital Right Management (  ...  At last, I am very grateful of my dear friends, Zhiyong Li, Chao Cheng, who offer me the confidence and discuss with me about my paper.  ... 
doi:10.18178/lnit.3.2.70-74 fatcat:l5aiylf7nvgxzk442cv3migd3e

SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS

Vanessa M. Santana, Paolina Centonze
2016 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
security mechanisms for Android and Apple for the chosen subset of OWASP vulnerabilities compare when placed side-by-side.  ...  Our comparative analysis covers a subset of OWASP top ten mobile vulnerabilities and seeing how Swift, Objective-C and Android programming languages safeguard against these risks and how the built-in platform  ...  Both the iOS and Android local storage options store data in plain text. Encryption is the best solution for securely storing data into any of these storage options.  ... 
doi:10.24297/ijct.v15i8.3754 fatcat:wtezltp3mjfszbcun3hhsveuru

Mobile Device Encryption Systems [chapter]

Peter Teufl, Thomas Zefferer, Christof Stromberger
2013 IFIP Advances in Information and Communication Technology  
Due to the important influence of the developer on the security of the iOS Data Protection system, we also present a tool that supports administrators in evaluating the right choice of data protection  ...  In order to address this situation, this paper presents an analysis of the access and data protection systems of the currently most popular platforms.  ...  In addition to this system, an additional system for the secure storage of private cryptographic keys is provided by Android.  ... 
doi:10.1007/978-3-642-39218-4_16 fatcat:tj3kfnnb6fgbjfasctusjlof3m

Secure Storage on Android with Context-Aware Access Control [chapter]

Faysal Boukayoua, Jorn Lapon, Bart De Decker, Vincent Naessens
2014 Lecture Notes in Computer Science  
Contrary to other Android-based solutions, we do not depend on device brand, hardware specs, price range or platform version. No modifications to the operating system are required.  ...  This paper presents a strategy for secure credential and data storage in Android. It is supplemented by a context-aware mechanism that restricts data availability according to predefined policies.  ...  For the security analysis, we assume that the sandboxing mechanism works correctly on both Android and iOS.  ... 
doi:10.1007/978-3-662-44885-4_4 fatcat:3ygqnk3y5zgo7ln2bt2n7sajzu

The German eID as an Authentication Token on Android Devices [article]

Florian Otterbein, Tim Ohlendorf, Marian Margraf
2017 arXiv   pre-print
In this paper we present a new approach for using the German eID concept on an Android device without the need of the actual identity card and card reader.  ...  A security evaluation of our approach reveals that two non-critical vulnerabilities on the architecture can't be avoided. Nevertheless, no sensitive information are compromised.  ...  The storage and transmission of an identity to the eID offerer has to be protected with a similar security level as on eID cards which use a secure element.  ... 
arXiv:1701.04013v1 fatcat:yvjysv3tlvgf7cmj5nl724blni

DroidVault: A Trusted Data Vault for Android Devices

Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena
2014 2014 19th International Conference on Engineering of Complex Computer Systems  
In this paper, we design and build DroidVault-the first realization of a trusted data vault on the Android platform.  ...  To address such challenges, we introduce the concept of the trusted data vault, a small trusted engine that securely manages the storage and usage of sensitive data in an untrusted mobile device.  ...  This research is partially supported by the research grant R-252-000-519-112 from Ministry of Education, Singapore.  ... 
doi:10.1109/iceccs.2014.13 dblp:conf/iceccs/LiHBJLS14 fatcat:4qetwtwhjrfwrpmktibyoajdnq

Security Protection Method of Energy Internet with Android

Yayun ZHU, Lin JIANG, Anqi YUAN, Yinghao YUAN
2022 Wuhan University Journal of Natural Sciences  
Specifically, we develop a secure TF card control program in the Android terminal application layer to realize the overall security scheme.  ...  As a product of the combination of information and energy technology, the energy internet is enormous and complex, and the absence of security safeguards at any aspect of it can cause incalculable damage  ...  Based on the theoretical analysis for different security issues and the results of the above summary and analysis, this paper uses trusted computing technology to enhance security for Android device terminals  ... 
doi:10.1051/wujns/2022271011 fatcat:ylp46emjd5gv7m5pb5klm257qa

Android Inter-App Communication Threats, Solutions, and Challenges [article]

Jice Wang, Hongqi Wu
2018 arXiv   pre-print
Then we summarize the security vulnerabilities and potential threats introduced by App communication. Finally, we discuss state of art researches and challenges on App collusion detection.  ...  Researchers and commercial companies have made a lot of efforts on detecting malware in Android platform. However, a recent malware threat, App collusion, makes malware detection challenging.  ...  App communication is the key Android Overview Android is a mobile operating system developed by google, based on a modified version of the Linux kernel and other open source software [9] .  ... 
arXiv:1803.05039v1 fatcat:5xol7tuek5c6rk5y53xhlykvlu

Syncing Mobile Applications with Cloud Storage Services

Paul POCATILU, Catalin BOJA, Cristian CIUREA
2013 Informatică economică  
His work currently focuses on the analysis of mobile computing, information security and cryptography.  ...  Cloud data storage is an option available almost on any mobile platform. Nowadays, there are multiple solutions for syncing data in mobile applications.  ...  files; Table 1 below presents a comparative analysis of cloud storage solutions on different operating systems  ... 
doi:10.12948/issn14531305/17.2.2013.08 fatcat:24tzdh6hdfdnngm7fdquqjp5je

User-friendly deniable storage for mobile devices

Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan Wang
2018 Computers & security  
Users can securely switch from the public mode to the hidden mode within 10 seconds, which is a significant improvement compared to previous solutions.  ...  In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices.  ...  We also provide a thorough security analysis on the fast switching mechanism and the adoption of the NFC technology.  ... 
doi:10.1016/j.cose.2017.09.005 fatcat:b3bboiparzgi7ar5maomiwgbxy

Forensics acquisition — Analysis and circumvention of samsung secure boot enforced common criteria mode

Gunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson
2018 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities.  ...  The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now.  ...  Acknowledgements The research leading to these results has received funding from the Research Council of Norway programme IKTPLUSS, under the R&D project Ars Forensica grant agreement 248094/O70.  ... 
doi:10.1016/j.diin.2018.01.008 fatcat:fkgzvwgmvfdnjnc3lhf44ulbtq

A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)

Buthaina Mohammed
2015 International Journal of Computer Applications  
The purpose of this paper is to explore the most significant security threats and vulnerabilities in the Android Operating System.  ...  The Android platform is an open source operating system, which is widely used on Smartphones. Android operating system usage and adaptation is rapidly increasing with a variety of applications.  ...  FUTURE WORK After analysis the Android security threats which can affect Android platform, the future work will involve to selecting one type of these threats which is Wireless access point (Wi-Fi) to  ... 
doi:10.5120/ijca2015907005 fatcat:4czz7k4hgnfcneh4fmf3yc6pfy
« Previous Showing results 1 — 15 out of 9,262 results