Title: A Policy-based Mechanism for restricting Execution of malicious apps in Android Smartphone

Issue Number: Vol. 8, No. 3
Year of Publication: Sep - 2018
Page Numbers: 209-213
Authors: Sanjeev Kumar Dwivedi, K.Muthumanickam, Ankur Singh Bist,Dr.P.C.Senthil Mahesh
Journal Name: International Journal of Digital Information and Wireless Communications (IJDIWC)
- Hong Kong
DOI:  http://dx.doi.org/10.17781/P002461

Abstract:


Android is the most widely accepted and used open source Operating System (OS) developed and supported by Google. Compared to other OS, the source code of Android OS can be modified by users to release with their own customized features. The internal features like built-in services and applications offered may differ from one developer to another including the user interface design. Android phone works based on several applications installed within them. While installing a new application may lead to some malicious software to be installed without the consent of the owner. Some of the application requests the user to access the resource from mobile phone such as SMS, Contacts, Alarm, Calculator, etc. But some of them access the resources which are not requested. This causes the data theft, leakage or loss. This paper proposed a policy based mechanism which incorporates a database about good and bad application which is based on required permission and used permission. The requested permissions of an application is compared with the good and bad application pattern and then its critical APIs are identified. If the predefined pattern matches with good application then it is concluded as secure to install. Otherwise, the user can assign necessary permissions to access the resource in the mobile phone and either the user will install the application or terminate it.