Advertisement

Multimedia Tools and Applications

, Volume 74, Issue 5, pp 1541–1555 | Cite as

Authentication of mobile applications through various local distributors

  • Kyusuk Han
  • Taeshik ShonEmail author
Article

Abstract

Trends in software distribution indicate a rapid change in an online application market. Current smartphones enable users to easily install various applications that are purchased from the online market using their phone. In addition, the openness of the Android system even allows users to choose from various online markets. Because such openness also invokes critical threats such as malware and illegal use, several online markets employ strong authentication techniques. However, such methods can also inconvenience valid users. In this paper, we discuss such problems and propose the concept of an authentication model that makes purchased applications available in most cases.

Keywords

Security Authentication Availability 

Notes

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2012R1A1A1010667).

References

  1. 1.
    Albano P, Castiglione A, Cattaneo G, De Santis A (2011) A novel anti-forensics technique for the android OS. BWCCA, pp 380–385Google Scholar
  2. 2.
    Backes M, Gerling S von Styp-Rekowsky P (2011) A novel attack against android phones. arXiv.org, vol. cs.CR. 21 Jun 2011Google Scholar
  3. 3.
    Cluley G (2012) Android malware poses as angry birds space game. NakedSecurity, SophosLab April 12, 2012Google Scholar
  4. 4.
    Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2010) Detection of malicious applications on android OS. ICWF, pp 138–149Google Scholar
  5. 5.
    Enck W, Octeau D, McDaniel P, Chaudhuri S (2011) A study of android application security. USENIX Security Symposium 2011Google Scholar
  6. 6.
    Rashid FY (2012) Black hat: Researchers find way to “bounce” malware into Google app store. SCMagazine, July 26, 2012Google Scholar
  7. 7.
    Zhou W, Zhou Y, Jiang X, Ning P (2012) Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY, pp 317–326Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.University of MichiganAnn ArborUSA
  2. 2.Division of Information and Computer Engineering College of Information TechnologyAjou UniversitySuwonSouth Korea

Personalised recommendations