Open Access Open Access  Restricted Access Subscription or Fee Access

Effective Identification of Malicious Threats and Security Issues in Android Apps

G. Sowmiya Devi, S. Suhashini, T. Nagamani

Abstract


The Mobile phones are used world widely, the day without mobile phone is imaginary now-a-days. The consequence of using App is security. In order to avoid security problem, we use three methods: user review, user rating, online feedback. In Online feedback we use url to   represent the security level. There are three levels of risk: high, low, medium. User rating and user review are taken as input and online feedback are produced as result.


Keywords


Risk Communication, Usability, Mobile Security

Full Text:

PDF

References


Christopher S. Gates, Jing Chen, Ninghui Li, Senior Member, IEEE, and Robert W. Proctor”Effective Risk Communication for Android Apps” IEEE Transactions on Dependable and Secure Computing,vol.11,no May-June 2014.

A.I. Anton, J.B. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen, “Financial Privacy Policies and the Need for Standardization,” IEEE Security and Privacy, vol. 2, no. 2, pp. 36-45, Mar./Apr. 2004. [2] D. Balfanz, G. Durfee, D.K. Smetters, and R.E. Grinter, “In Search of Usable Security: Five Lessons from the Field,” IEEE Security and Privacy, vol. 2, no. 5, pp. 19-24, Sept./Oct. 2004.

R. Biddle, P.C. van Oorschot, A.S. Patrick, J. Sobey, and T. Whalen, “Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study,” Proc. ACM Workshop Cloud Computing Security, pp. 19-30, 2009.

Chin, A.P. Felt, V. Sekar, and D. Wagner, “Measuring User Confidence in Smartphone Security and Privacy,” Proc. Eighth Symp. Usable Privacy and Security (SOUPS ’12), pp. 1-16, 2012.

L.F. Cranor, M. Arjula, and P. Guduru, “Use of a P3P User Agent by Early Adopters,” Proc. ACM Workshop Privacy in the Electronic Soc., pp. 1-10, 2002.

L.F. Cranor, P. Guduru, and M. Arjula, “User Interfaces for Privacy Agents,” ACM Trans. Computer-Human Interaction (TOCHI ’06), vol. 13, no. 2, pp. 135-178, 2006.

N. Dell, V. Vaidyanathan, I. Medhi, E. Cutrell, and W. Thies, “Yours is Better!: Participant Response Bias in HCI,” Proc. Conf. Human Factors in Computing Systems, pp. 1321-1330, 2012.

A. Diederich and J.R. Busemeyer, “Judgment and Decision Making,” Experimental Psychology, A.F. Healy and R.W. Proctor, eds., second ed., pp. 295-319, John Wiley & Sons, 2013.

S. Egelman, L.F. Cranor, and A. Chowdhury, “An Analysis of P3P -Enabled Web Sites among Top-20 Search Results,” Proc. Eighth Int’l Conf. Electronic Commerce, pp. 197-207, 2006.

S. Egelman, J. Tsai, L.F. Cranor, and A. Acquisti, “Timing Is Everything?: The Effects of Timing and Placement of Online Privacy Indicators,” Proc. 27th Int’l Conf. Human Factors in Computing Systems, pp. 319-328, 2009.

B. Fathi, Engineering Windows 7 : User Account Control, MSDN blog on User Account Control, http://blogs.msdn.com/b/e7/ archive/2008/10/08/user-account-control.aspx, Oct. 2008.

A.P. Felt, K. Greenwood, and D. Wagner, “The Effectiveness of Application Permissions,” Proc.Second USENIX Conf. Web Application Development (WebApps ’11), 2011.

A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android Permissions: User Attention, Comprehension, and Behavior,” Proc. Eighth Symp. Usable Privacy and Security, 2012.

M.L. Finucane, A. Alhakami, P. Slovic, and S.M. Johnson, “The Affect Heuristic in Judgments of Risks and Benefits,” J. Behavioral Decision Making, vol. 13, no. 1, pp. 1-17, 2000.

K.A. Juang, S. Ranganayakulu, and J.S. Greenstein, “Using System-Generated Mnemonics to Improve the Usability and Security of Password Authentication,” Proc. Human Factors and Ergonomics Soc. Ann. Meeting, vol. 56, no. 1, pp. 506-510, 2012.




DOI: http://dx.doi.org/10.36039/AA022016001.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.