Authentication of mobile applications through various local distributors
- 286 Downloads
Trends in software distribution indicate a rapid change in an online application market. Current smartphones enable users to easily install various applications that are purchased from the online market using their phone. In addition, the openness of the Android system even allows users to choose from various online markets. Because such openness also invokes critical threats such as malware and illegal use, several online markets employ strong authentication techniques. However, such methods can also inconvenience valid users. In this paper, we discuss such problems and propose the concept of an authentication model that makes purchased applications available in most cases.
KeywordsSecurity Authentication Availability
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2012R1A1A1010667).
- 1.Albano P, Castiglione A, Cattaneo G, De Santis A (2011) A novel anti-forensics technique for the android OS. BWCCA, pp 380–385Google Scholar
- 2.Backes M, Gerling S von Styp-Rekowsky P (2011) A novel attack against android phones. arXiv.org, vol. cs.CR. 21 Jun 2011Google Scholar
- 3.Cluley G (2012) Android malware poses as angry birds space game. NakedSecurity, SophosLab April 12, 2012Google Scholar
- 4.Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2010) Detection of malicious applications on android OS. ICWF, pp 138–149Google Scholar
- 5.Enck W, Octeau D, McDaniel P, Chaudhuri S (2011) A study of android application security. USENIX Security Symposium 2011Google Scholar
- 6.Rashid FY (2012) Black hat: Researchers find way to “bounce” malware into Google app store. SCMagazine, July 26, 2012Google Scholar
- 7.Zhou W, Zhou Y, Jiang X, Ning P (2012) Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY, pp 317–326Google Scholar