sponsored by ComputerWeekly.com
Posted:  04 Mar 2013
Published:  04 Mar 2013
Format:  PDF
Type:  Essential Guide
Language:  English



By James Sellwood and Jason Crampton


A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers.


Changes to the way the Android platform authorises permission requests could compromise the security of unwary users.


Since the first commercial device was made available in October 2008, the Android platform has enjoyed a meteoric rise. In those four years it has grown to hold the greatest market share among many of the world’s most significant smartphone markets.


Competing head to head with Apple’s iOS platform, the two operating systems are used in the vast majority of the world’s smartphones.


The Android platform has evolved considerably since its introduction. Since 2008, there have been 25 platform version releases – the latest being 4.2.1 – introducing 17 different API levels in that time.


These releases have introduced numerous new features and, as one might expect nowadays, they have also included various bug fixes and security patches.


One area of the Android platform has undergone continued development in that time and has received close scrutiny due to its significant security role and noticeable disparity from similar mechanisms on other platforms.


The area in question is the Android permission architecture.


Click on the button below to download this article


Royal Holloway Information Security Thesis Series



Mobile Device Management | Mobile Workers | Secure Content Management | Secure Content Management Software | Security | Security Architectures | Security Best Practices | Security Management | Security Threats

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement