CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

User Usage Attack and Security Measure

by Jaspreet Kaur, Anu Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 21
Year of Publication: 2013
Authors: Jaspreet Kaur, Anu Garg
10.5120/12192-8285

Jaspreet Kaur, Anu Garg . User Usage Attack and Security Measure. International Journal of Computer Applications. 70, 21 ( May 2013), 22-25. DOI=10.5120/12192-8285

@article{ 10.5120/12192-8285,
author = { Jaspreet Kaur, Anu Garg },
title = { User Usage Attack and Security Measure },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 21 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number21/12192-8285/ },
doi = { 10.5120/12192-8285 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:27.880177+05:30
%A Jaspreet Kaur
%A Anu Garg
%T User Usage Attack and Security Measure
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 21
%P 22-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Android is an open platform which is becoming very popular operating system. Its open source code is easily handled by the users to get and use new contents and applications on their handsets. Android is totally a permission based process to develop the applications. With the increasing popularity of these smart phones, additional privacy protection to these devices is required. Android is more flexible to become attractive targets for malicious attacks due to significant advances in both hardware and operating systems. Likewise, by installing malicious contents on the device, users can be breached of their security through the compromised information. By compromising user's privacy, malicious applications can access voice recording devices, cameras, intercept SMS messages, usage information or gain location information. Thus the security and privacy are the two most important concerns in android. The need to maintain security and data confidentiality on the Android platform makes it an urgent issue to find loop holes in security. In this thesis I present an attack on user's usage. This attack allows adversaries to steal the user's usage information and enables attack to get information like what all applications are installed on the mobile, time stamp and date stamp of usage with implementation and a security measure for this spy attack theoretically.

References
  1. Analysis of Android Applications' Permissions Ryan Johnson, Zhaohui Wang Center for Secure Information Systems George Mason University 4400 University Dr, Fairfax, Virginia 22030 Email: {rjohnso8, zwange}@gmu. edu Corey Gagnon Department of Computer Science James Madison University Harrisonburg, Virginia 22807 Email: gagnonca@dukes. jmu. edu Angelos Stavrou Center for Secure Information Systems George Mason University 4400 University Dr, Fairfax, Virginia 22030 Email: astravrou@gmu. edu
  2. "A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android". David Barrera, H. Güne¸s Kayac?k, P. C. van Oorschot and Anil Somayaji. 2010, Vol. Copyright.
  3. Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns Joon-Myung Kang*Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON, Canada joonmyung. kang@utoronto. ca ,Sin-seok Seo Department of Computer Science and Engineering, Pohang University of Science and Technology (POSTECH), Pohang, Korea sesise@postech. ac. kr ,James Won-Ki Hong Division of IT Convergence and Engineering, Pohang University of Science and Technology (POSTECH), Pohan
Index Terms

Computer Science
Information Sciences

Keywords

Attack Information Permissions