Skip to main content
Log in

Authentication of mobile applications through various local distributors

Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Trends in software distribution indicate a rapid change in an online application market. Current smartphones enable users to easily install various applications that are purchased from the online market using their phone. In addition, the openness of the Android system even allows users to choose from various online markets. Because such openness also invokes critical threats such as malware and illegal use, several online markets employ strong authentication techniques. However, such methods can also inconvenience valid users. In this paper, we discuss such problems and propose the concept of an authentication model that makes purchased applications available in most cases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. http://www.palm.com It is currently redirected to HP Inc.

  2. More information can be found here. http://msdn.microsoft.com/en-us/library/ms905511.aspx

References

  1. Albano P, Castiglione A, Cattaneo G, De Santis A (2011) A novel anti-forensics technique for the android OS. BWCCA, pp 380–385

  2. Backes M, Gerling S von Styp-Rekowsky P (2011) A novel attack against android phones. arXiv.org, vol. cs.CR. 21 Jun 2011

  3. Cluley G (2012) Android malware poses as angry birds space game. NakedSecurity, SophosLab April 12, 2012

  4. Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2010) Detection of malicious applications on android OS. ICWF, pp 138–149

  5. Enck W, Octeau D, McDaniel P, Chaudhuri S (2011) A study of android application security. USENIX Security Symposium 2011

  6. Rashid FY (2012) Black hat: Researchers find way to “bounce” malware into Google app store. SCMagazine, July 26, 2012

  7. Zhou W, Zhou Y, Jiang X, Ning P (2012) Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY, pp 317–326

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2012R1A1A1010667).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taeshik Shon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Han, K., Shon, T. Authentication of mobile applications through various local distributors. Multimed Tools Appl 74, 1541–1555 (2015). https://doi.org/10.1007/s11042-013-1520-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1520-y

Keywords

Navigation