Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Sustainability  /  Vol: 10 Núm: 4 Par: April (2018)  /  Artículo
ARTÍCULO
TITULO

Efficient Protection of Android Applications through User Authentication Using Peripheral Devices

Jinseong Kim and Im Y. Jung    

Resumen

Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. However, by manipulating these physical device values, an attacker can circumvent the authentication by executing a Same Identifier Attack and obtain the same application privileges as the user. In our work, WhatsApp, KakaoTalk, Facebook, Amazon, and Syrup were subjected to the Same Identifier Attack, and it was found that an attacker could gain the same privileges as the user, in all five applications. To solve such a problem, we propose a technical scheme—User Authentication using Peripheral Devices. We applied the proposed scheme to a Nexus 5X smartphone running Android version 7.1 and confirmed that the average execution time was 0.005 s, which does not affect the other applications’ execution significantly. We also describe the security aspects of the proposed scheme and its compatibility with the Android platform and other applications. The proposed scheme is practical and efficient in terms of resource usage; therefore, it will be useful for Android users to improve Android application security.

 Artículos similares

       
 
Maja Poznanovic Spahic, Goran Marinkovic, Darko Spahic, Sanja Sakan, Ivana Jovanic, Marina Magazinovic and Nata?a Obradovic    
The study of aquifers of the Lece andesite complex (LAC) and its surroundings yielded a new procedural stepwise analysis that allowed the assessment of the origin of elements, particularly in areas affected by both anthropogenic and natural influences. T... ver más
Revista: Water

 
Bimal Kumar Roy and Anandarup Roy    
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th... ver más
Revista: IoT

 
Ming-An Chung, Tze-Hsun Wang and Chia-Wei Lin    
Environmental, social, and governance issues have gained significant prominence recently, particularly with a growing emphasis on environmental protection. In the realm of heightened environmental concerns, unmanned aerial vehicles have emerged as pivota... ver más
Revista: Urban Science

 
Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz-López and Yury Niño Roa    
Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that inc... ver más

 
Zeeshan Ashraf, Zahid Mahmood and Muddesar Iqbal    
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have been ... ver más
Revista: Future Internet