Security to Android Mobile Applications: Camera Based
Total Page:16
File Type:pdf, Size:1020Kb
ISSN 2319-8885 Vol.04,Issue.29, August-2015, Pages:5534-5539 www.ijsetr.com Security to Android Mobile Applications: Camera Based Security and Theft Alert Mobile Phones 1 2 3 SANA SULTANA , G.VEERANJANEYULU , SALEHA FARHA 1PG Scholar, Dept of CSE, Shadan Women’s College of Engineering and Technology, Hyderabad, TS, India, E-mail: [email protected]. 2Professor, Dept of CSE, Shadan Women’s College of Engineering and Technology, Hyderabad, TS, India, E-mail: [email protected]. 3HOD, Dept of CSE, Shadan Women’s College of Engineering and Technology, Hyderabad, TS, India, E-mail: [email protected]. Abstract: Now Smartphone’s are simply small computers with added services such as GSM, radio. Thus it is true to say that next generations of operating system will be on these Smartphone and the likes of windows, IOS and android are showing us the glimpse of this future. Android has already gained significant advantages on its counterparts in terms of market share. One of the reason behind this is the most important feature of Android is that it is open-source which makes it free and allows any one person could develop their own applications and publish them freely. This openness of android brings the developers and users a wide range of convenience but simultaneously it increases the security issues. The major threat of Android users is Malware infection via Android Application Market which is targeting some loopholes in the architecture mainly on the end-users part. Attackers can implement spy cameras in malicious apps such that the phone camera is launched automatically without the device owner’s notice, and the captured photos and videos are sent out to these remote attackers. Nowadays, people carry their phones everywhere; hence, their phones see lots of private information. If the phone camera is exploited by a malicious spy camera app, it may cause serious security and privacy problems. Specifically, we discover several new attacks that are based on the use of phone cameras. We implement the attacks on real phones, and demonstrate the feasibility and effectiveness of the attacks. Furthermore, we propose a lightweight defense scheme that can effectively detect these attacks. Keywords: Camera Based Attacks, Watch Dog, anti-Thief. I. INTRODUCTION malicious software written by network hackers causing harm Mobile phones are becoming important part of our day to to its privacy. This demands the study of the Security day life specially the smart phones, since they are involved in Mechanisms for Android and on the way make it simple and keeping in touch with friends and family, doing business, user understandable making the user aware of areas where he accessing the internet and other activities. Android is a has to be careful. modern mobile platform that was designed to be truly open. Android applications make use of advanced hardware and It indicates that smart phone sales are continuously on rise software, as well as local and served data, exposed through and more and more people are becoming dependent on these the platform to bring innovation and value to consumers devices. As these smart phones are going to outnumber the Developed by the Open Handset Alliance (visibly led by world’s total population in 2014, securing these devices has Google), based on Linux platform, Android is a widely assumed paramount importance. Owners use their smart anticipated open source operating system for mobile devices phones to perform tasks ranging from everyday that provides a base operating system, an application communication with friends and family to the management middleware layer, a Java software development kit (SDK), of banking accounts and accessing sensitive Work related and a collection of system applications. The widespread data. These factors, combined with limitations in usage of mobile devices and its increasing functionalities has administrative device control through owners and security made both enterprises and consumers to rely on these devices critical applications like the banking transactions, make for their daily life. The most innovative feature of Android Android-based Smart phones a very attractive target for OS is open source because of which anybody can publish hackers, attackers and malware authors with almost any kind their applications freely on the android market. This openness of motivation. In this article we have focus on two crucial brings large number of developers which use this platform, parts such as follows: but here comes the risk that user is may download and use a Copyright @ 2015 IJSETR. All rights reserved. SANA SULTANA, G.VEERANJANEYULU, SALEHA FARHA To implement an android based attacks detection and 2. Application Framework Layer: This layer is developed prevention system from camera based attacks on mobile specifically for allowing developers full access to the core phone. And demonstrate the feasibility and application framework used by the API. It consists of a range effectiveness of the attacks detection and prevention. of services and system structure which include Active To develop an application such that when a user loses Manager, Windows Manager, View system, Contents his/her phone, the spy camera could be launched via Provider, Package Manager, Resource Manage, and so on. remote control and capture what the thief looks like as well as the surrounding environment. Then the pictures or videos along with location information (GPS coordinates) can be sent back to the device owner so that the owner can pinpoint the thief and get the phone back. This paper is organized as, first overview of android OS, its architecture and describes the multi layer structure which starts with a Linux core, structure of android security & its vulnerabilities’ and study the malware threats present for the android OS. Limitation of security model, then in the end future of android security. II. EXISTING AND PROPOSED SYSTEMS A. Existing System The Android permission system gives users an opportunity to check the permission request of an application (app) before installation, few users have knowledge of what all these permission requests stand for; as a result, they fails to warn users of security risks. Meanwhile, an increasing number of apps specified to enhance security and protect user privacy have appeared in Android app markets. In addition, there are data protection apps that provide users the capability to encrypt, decrypt, sign, and verify signatures for private texts, emails, and files. Fig.1. Android Architecture (from Top to Bottom are Application, Application Framework, Libraries & B. Proposed System Android Runtime and Linux Kernel). We design a further checking mechanism for third party camera-based apps. Analyzing activity pattern is an effective 3. Libraries and Android Run-time Layer: This layer is approach in malware detection. For each type of spy camera mainly associated with the process running. The core library attack, we are able to extract a specific feature from its provides most of the features of Java programming language. activity pattern. The activity pattern of spy camera apps is Additionally, each program of Android has a separate totally different from legitimate camera apps. The defense Dalvik’s Java virtual machine environment. app is able to decide the dynamic launch pattern of camera related apps by polling the task list. If a camera app calls a 4. The fourth layer - Linux kernel: Kernel of Android is camera in one of the above situations, the defense app gives Linux 2.6 core which, Similar to a desktop computer running warnings to the phone user. This process is detected by the Linux, the Android kernel will take care of power and defense app, and a warning message with its name is memory management, device drivers, process management, displayed before the user enters his/her credentials. networking, and security. The Android kernel is available at http://android.git.kernel.oro III. STRUCTURE OF ANDROID A. Architecture B. Security Mechanism in Android With the steady improvement in the android the basic As we can see the multi layer architecture of android each Android System Architecture and Application frameworks layer have to deal with its own problem and there prevention remains the same as follows: mechanism such as Android provides following security features to achieve these objectives by robust security at the 1. Application Layer: The application component of the operating system level through the Linux kernel, a Android operating system is the closest to the end user. This compulsory application sandbox for all applications, a Secure is where the Contacts, Phone, Messaging, and Angry Birds interposes communication, Application permission apps live. As a developer, your finished product will execute mechanism, and Application signing. Techniques of Linux in this space by using the API libraries and the Dalvik VM security, Dalvik JVM and application specific security this includes a core application package, such as Email mechanisms are tabulated as follows, But these prevention Client, Web Browser etc measures can be broadly classified into 3 types International Journal of Scientific Engineering and Technology Research Volume.04, IssueNo.29, August-2015, Pages: 5534-5539 Security to Android Mobile Applications: Camera Based Security and Theft Alert Mobile Phones Privilege Separation (Sandboxing) Mechanism execute. Any certification authority to sign the certificate is Application Permission Mechanism not required, and Android will