Welcome. Android Operation System And Security on Android Omar Alaql Salah Alamri Design of Secure Operating System.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

WHAT IS ANDROID? A Software platform and operating system for mobile. Based on the Linux kernel. Android was found way back in It was developed.
MOOC on M4D 2013 I NTRODUCTION TO THE A NDROID P LATFORM Ashish Agrawal Indian Institute of Technology Kanpur.
Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
Introduction to Android Mohammad A. Gowayyed CS334-Spring 2014.
Programming Mobile Applications with Android
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DEPARTMENT OF COMPUTER ENGINEERING
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Introduction to Android Platform Overview
Case study 2 Android – Mobile OS.
Security issues for mobile devices Cvetko Andreeski.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
A+ Certification Guide Chapter 10 Mobile Devices.
Confidential Company Internal396/ LXE Uen PA2Xperia Transfer Mobile Communication Material Company Internal396/ LXE.
Presentation By Deepak Katta
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
eScan Total Security Suite with Cloud Security
Mobile Application Development with ANDROID. Agenda Mobile Application Development (MAD) Intro to Android platform Platform architecture Application building.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
Android Introduction Based on slides made by
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
1 Android- Platform Overview. 2 What is Android? Android is a software stack for mobile devices that includes an operating system, middleware and key.
GEOREMINDERS ANDROID APPLICATION BY: ADRIENNE KECK.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Android Security Auditing Slides and projects at samsclass.info.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)
Created By. Jainik B Patel Prashant A Goswami Gujarat Vidyapith Computer Department Ahmedabad.
Wireless and Mobile Security
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
VMM Based Rootkit Detection on Android
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Analysis And Research Of System Security Based On.
AGENDA Introduction History Version history Features and specifications Android latest Android vs Symbian Android market Advantages of Android Disadvantages.
1 Get All Answers Get All Answers. Contents History of Android Android Fragmentation The Role of Google Features and Architecture Android Software Development.
By : Abhishek Verma Main Topics : 1. Introduction 2. Platform 3. Software Development 4. Overall Evaluation.
By Adam Reimel. Outline Introduction Platform Architecture Future Conclusion.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Android. Android An Open Handset Alliance Project A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google.
Brian Atzori 4B 2015/2016.
Module 51 (Mobile Device Fundamentals - Android)
Mobile Operating Systems
TECHNOLOGY GUIDE THREE
Security of Mobile Operating Systems
How To Fix Verification Failed Error On iCloud?
Chapter 10. Mobile Device Security
Presentation transcript:

Welcome

Android Operation System And Security on Android Omar Alaql Salah Alamri Design of Secure Operating System

Outline: Introduction. Android Sold. History. Timeline. Advantages and Disadvantages in Android. Android Architecture. Security and privacy in Android. Weakness Points. Android App piracy. Security Precautions. Android OS and Apple IOS Conclusion.

Introduction Android is a modern mobile platform that was designed to be open. Android was designed with developers in mind, uses are provided visibility into how applications work and control from any attackers. Android is a Linux-based operating system but it’s not based on the type of Linux system you may have used on your PC. Android is open source software stack for a wide range of mobile devices and a corresponding open-source project led by Google honestly modified and distributed by device manufacturers, wireless carriers and enthusiast developers. By the third quarter of 2012 Android had a 75% share of the global smartphone market according to the research firm IDC.

Android Sold

History Android, Inc. was founded in Pal alto,California in October 2003 by Andy Rubin, Rich Miner, Nick, and White. Acquired Android INC by Google on August 17, At Google, the team led by Rubin developed a mobile device platform powered by Linux Kernel. November 5,2007, the open handset Alliance, where that day, Android was unveiled as its first product. October 22, 2008,the first commercially available phone to run Android was the HTC Dream. in 2010, Google launched its Nexus series of devices In 2014, Google launched Android One, a standardized smartphone, mainly targeting customers in the developing world. As of March 3, 2015, the newest version of the Android operating system, Android 5.1

Timeline

Android versions

Advantages and Disadvantages Android is open. It can be developed by anyone. Easy access to the Android Market. Populist Operating System. USB full facilities Can replace the battery, etc. Easy in terms of notification. Supports all Google services. Install Rom modification.

Advantages and Disadvantages Connected to the internet Sometimes slow device company issued an official version of Android on their own. Android Market has less control of the Manager. As direct service providers to connect with the Google. Sometimes there are ads. Wasteful batteries.

Android Architecture Android security control to: Protect user data. Protect system resources ( including the network). Provide application isolation. Android provides these key security features. Robust security at the OS level through the Linux Kernel. Mandatory application sandbox for all applications. Secure interprocess communication. Application signing. Application- defined and user-granted permissions.

Android Architecture

Security and privacy in Android Android device owners are not given root access to the operating system and sensitive partitions such as systems are read-only. Root access can be obtained by exploiting security flaws in Android, which is used frequently by the open- source community to enhance the capabilities of their devices but also by malicious parties to install viruses and malware. An android application makes use of a sandbox to avoid sharing personal information. In computer security, a sandbox is a security mechanism for separating running programs.

Security and privacy in Android Android applications run in a sandbox where Sandbox is isolated area of the system that does not have access to the rest of the system's resources. unless access permissions are granted by the user. Before installing an application, the play store displays all required permissions. The sandboxing and permissions system Reduces impact of vulnerabilities and bugs in applications, but developer confusion and limited documentation is still a problem.

Security and privacy in Android Android is becoming the most-targeted of the mobile platforms. The open nature of Android and its large user base have made it an attractive and profitable platform to attack. Common exploits and tool kits on the OS can be utilized across wide number of devices, meaning that attackers can perform exploits en masse and re-use attack vectors Google did take measures in the development of the android kernel to build security measures in; the OS is sandboxed, preventing malicious processes from crossing between applications. Google provides major updates to Android every six to nine months.

Security and privacy in Android The Android system has no internal back-up and restore. There are many third-party applications available on the internet such as My Backup and Wave Secure so try downloading them and backing up all your content on your PC. An increasing security risk is mobile theft. Shortage of hardware data encryption. Honeycomb operating software has hardware encryption problems. Android’s increasing popularity is making it liable for SMS-phishing. Security problem with Android is the Play Market. Its filled with unlimited applications and they keep increasing. There are more and more Android malware and Fake anti-malware. Increased more than 400% this year. Several security firms have released antivirus software for Android devices. Lookout Mobile Security. AVG Technologies McAfee

Weakness Points User as admin. Install apps, grant app permissions, download data, and access unprotected networks. The Android Market. Google’s verification processes for applications entering their market have been shown to be woefully lacking over the last year or two. a number of malware-infected apps and games being made available to users. Gateway to PC: HTC devices have long been able to utilize a VPN. Application permissions. the reality is that many apps request permission to access sensitive content they have no actual need for. Malicious application injections. Data/process transfers between virtualized application environments are handled by a protocol of implicit and explicit intents.

Weakness Points Untrusted third party applications. difficult to identify reputable vendors Rooting. Rooting an Android device is akin to jail-breaking an iPhone. It opens out additional functionality and services to users. The process of gaining root access requires the device to be switched from S-On to S-Off (where S =security). Root is common exploit used by malicious applications to gain system- level access to your android. Wi-Fi. The vulnerability of android devices running to compromise on unprotected Wi-Fi networks. FaceNiff is an easily downloadable application that allows the user to intercept the social networking logins.

Android App piracy in 2010, Google released a tool for validating authorized purchases for use within apps. but developers complained that this was insufficient and trivial to crack. In 2012 Google released a feature in Android 4.1 that encrypted paid applications so that they would only work on the device on which they were purchased. but this feature has been temporarily deactivated due to technical issues.

Security Precautions Manufacturer Bootleggers: The issue with HTC devices logging and transmitting user data is a significant vulnerability and the only ‘out of the box’ option is to wait for a patch. for example android vncserver. APK which is a remote access tool – it could easily be innocuous or tied to functionality such as trace and wipe, but it is certainly something worth being aware of. Permissions management: LBE Privacy Guard acts as somewhat of an application firewall. granting the user the capacity to prevent an application’s individual permissions

Security Precautions Trace and wipe: The Android equivalent of business continuity implementation. If your Android device is lost or stolen, you can use these applications to remotely ping the device for its location and/or instruct it to delete specific content. Installing trusted packages: The ability to install non-Market applications on to a Google device. APK files are the standard Android install file format and are a variant of JAR. A program called APK Inspector has recently been released that will scan the assets, resources, and certificates contained within the APK to ensure it is secure.

Security Precautions Anti-virus: None of these apps are asking for root access, and therefore they are failing to search for infections on the area of the device that is most targeted and vulnerable. it covers the apps folders, SD card, SMS, and contact. Droid Security, Lookout. Link security: malicious links are always loitering in the background waiting to seduce and ensnare hapless users. There are a number of vendors that have created link security applications.

Android OS and Apple IOS Android 5.1 Silent mode added after missing on Android 5.0 General improvements in system stability Improved RAM management Fixes for sudden app closures Improved battery management Excessive consumption of network devices when used Wi-Fi fixed Issues with wireless connections fixed Problems with Okay Google function solved Notifications problems solved Some sound problems experience by certain devices fixed Other improvements and changes Changes in the Material Design color palette (after users complaints, possibly for a higher version though)

Android OS and Apple IOS iPhone IOS 8 Customizable Mail. Applications and battery usage. Dismiss Notifications by just Swiping. Notes and pictures. Better Camera Controls. Apple came with some nice features for shutterbugs in iOS 8. Weather. Lock Screen Notifications based on your location. Keyboards. Landscaped Home screen. Key Shortcut

Android OS and Apple IOS Video and Photo Sharing. Audio Messages. Sharing Location. Contact Info. Revert pictures. Shazam detects songs. Apple 8.2 Watch app Fix same apps

Android OS and Apple IOS Technical Specifications The following table details some of the technical specifications of the Android and Apple IOS devices. Although there are some similarities, the two platforms are very different in end-user experience.

Android OS and Apple IOS in Security There are many different between OS and IOS in the Security.

Conclusion The Android's goal is to establish a enormous installed base for developers to take advantage. One of the method it will accomplish this is according to different kinds of hardware running the same software environment. It has proposed security mechanisms based on SELinux policy theory to ensure system security on application program framework layer. it uses Android's security framework to ensure system security from the application layer intrusion it is essential to research and develop the method to protect the Android framework. There is no one-stop effective security measure that can be implemented on an Android operating system. MDM products provides some much needed functionality to the mobile security tool kit.

Reverences _2.pdf _2.pdf sms-phishing-scams.html sms-phishing-scams.html &url=

Reverences that-mean/ that-mean/ program-overview program-overview disadvantages-android.html disadvantages-android.html oogle+provides+major+updates+to+Android+every+six+to+nine+months.&sourc e=bl&ots=8P- 6X5oDpV&sig=WoP4cej1lvFc3Io2aRi9Z7EH3tI&hl=en&sa=X&ei=pg0OVbyXL4n FggTfr4LQDQ&ved=0CCYQ6AEwAQ#v=onepage&q=Google%20provides%20 major%20updates%20to%20Android%20every%20six%20to%20nine%20month s.&f=false oogle+provides+major+updates+to+Android+every+six+to+nine+months.&sourc e=bl&ots=8P- 6X5oDpV&sig=WoP4cej1lvFc3Io2aRi9Z7EH3tI&hl=en&sa=X&ei=pg0OVbyXL4n FggTfr4LQDQ&ved=0CCYQ6AEwAQ#v=onepage&q=Google%20provides%20 major%20updates%20to%20Android%20every%20six%20to%20nine%20month s.&f=false

Thank Everybody