Acknowledgement
The authors would like to thank the Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University, Alkharj, Saudi Arabia for the assistance.
References
- A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. Google Android: A Comprehensive Security Assessment. In IEEE Security & Privacy, Volume 8, Issue 2, pp. 35-44, March-April 2010. https://doi.org/10.1109/MSP.2010.2
- T. Blasing, L. Batyuk, A.-D. Schmidt, S.A. Camtepe and S. Albayrak. An Android Application Sandbox system for suspicious software detection. In Proceedings of 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), Nancy, France, Oct. 19-20, 2010.
- M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of the Annual Computer Security Applications Conference (ACSAC '09), Austin, TX, USA, December 6-10, 2009.
- W. Shin, S. Kiyomoto, K. Fukushima, and T. Tanaka. Towards Formal Analysis of the Permission-Based Security Model for Android. In Proceedings of Fifth International Conference on Wireless and Mobile Communications (ICWMC '09), Cannes/La Boca, France, August 23-29, 2009.
- P. Teufl, C. Orthacker, S. Kraxberger, G. Lackner, M. Gissing, A. Marsalek, J. Leibetseder and O. Prevenhueber. Android Market Analysis with Activation Patterns, In Proceedings of 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011), Aalborg, Denmark, May 17-19, 2011.
- C. Orthacker, P. Teufl, S. Kraxberger, G. Lackner, M. Gissing, A. Marsalek, J. Leibetseder, and O. Prevenhueber. Android Security Permissions - Can we trust them? In Proceedings of 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011), Aalborg, Denmark, May 17-19, 2011.
- J. Burns. Developing Secure Mobile Applications for Android-An Introduction to Making Secure Android Applications, http://www.isecpartners.com/files/iSEC_Securing_Android_Apps.pdf, Accessed on May 8, 2012.
- E. Chin, A. Porter Feltm, K. Greenwood, and D. Wagner. Analysing the Inter-application Communication in Android, University of California, Berkeley, Berkeley, CA, USA.
- T. Vidas, D. Votipka, and N. Christin. All Your Droid Are Belong To Us: A Survey of Current Android Attacks, INI/CyLab, Carnegie Mellon University.
- Android Market, http://www.android.com/market, Accessed on May 13, 2012.
- Android permissions, http://android.git.kernel.org/?p=platform/frameworks/base.git;a=blob;f=core/res/AndroidManifest.xml. Accessed on May 13, 2012.
- A. Shabtai, Y. Fledel, and Y. Elovici. Securing Android-powered mobile devices using SE Linux. In IEEE Security & Privacy, Volume 8, Issue 3, pp. 36-44, May-June 2010.
- I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani Crow droid. Behaviour-Based Malware Detection System for Android. In Proceedings of the Workshop on Security and Privacy in Smartphone's and Mobile Devices (SPSM'11), Chicago, IL, USA, October 17, 2011.
- L. Yihe. An Information Security Model Based on Reputation and Integrality of P2P Network. In Proceedings of 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, China, April 25-26, 2009.
- L. Qi. Network Security Analysis Based on Reputation Evaluation. In Proceedings of 2011 International Conference on Information Technology, Computer Engineering and Management Sciences (ICM 2011), Nanjing, China, September 24-25, 2011.
- http://developer.android.com/reference/android/content/Context.html
- http://developer.android.com/reference/android/content/Context.html
- Lucas Jordan, Pieter Greyling, "Practical Android Projects" Apress, 2011.
- H. Bing. Analysis and Research of Systems Security Based on Android, In Proceedings of 2012 Fifth International Conference on Intelligent Computation Technology and Automation (ICICTA), Zhangjiajie, Hunan, and January 12-14, 2012.
- B. Berger, M. Bunke, and K. Sohr, An Android Security Case Study with Bauhaus, in the proceedings of 2011 18th Working Conference on Reverse Engineering (WCRE), Limerick, October 17-20.