slugAndroid Environment Security Through Penetration Testing Methodology

Abstract

The fluidity of application markets complicate Smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of Smartphone applications. This paper seeks to better understand Smartphone application security by studying tested its security through penetration testing. We introduce the ded decompiler, which recovers Android application source code directly from its installation image. Our analysis uncovered pervasive use/misuse of personal/ phone identifiers, and deep penetration of advertising and analytics networks. In this paper information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server. Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration testing methodologies is that the penetration tester should follow a pre-scripted format during test as dictated by the methodology. A penetration testing methodology based on the research “4 - step penetration planning” was proposed in this research

Authors and Affiliations

Sangita Dahiya, Vinod Saroha

Keywords

Related Articles

Performance and Emission Test on Chlorella Algae Oil Blend with Diesel

This study discusses performance and exhaust emission of the vehicle fueled with low content chlorella algae oil (property of the algae oil is similar to the property of diesel) blend with pure diesel in CI engine. The...

Development Of An Optimized Hybrid System Based On PV And Biomass

enewable energy can be seen as one of the important prospect of today’s research, as it enlightens the lives of millions of people by fulfilling multiple necessities of their daily life and simultaneously overcomes the...

Safe Guard for Wild Animal

In today’s world, wildlife is an important factor in maintain natural balance of any nation’s environment. One of the important and vital roles is played by the forest department. There are many concerns regarding the s...

Use of Industrial Waste Materials in Road Construction

There are many types of waste material found in India like industrial, building, household, agricultural etc. it includes coal ash, stone quarry, plastics, glass, recycled aggregate, geo-naturals, fibers and polythene b...

An Introduction to Lid Systems

The main task of automatic Language Identification (LID) is to quickly and accurately identify the language being spoken. Language identification has numerous applications in a wide range of multi-lingual services e.g....

Download PDF file
  • EP ID EP17963
  • DOI -
  • Views 377
  • Downloads 13

How To Cite

Sangita Dahiya, Vinod Saroha (2014). slugAndroid Environment Security Through Penetration Testing Methodology. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17963