Northern Kentucky University

Mobile Application Security

Institution

Northern Kentucky University

Abstract

As mobile applications become widely used, they have become targets for computer criminals to exploit. To help understand the extent of resources that an Android application uses during the installation process, we have built an application that observes the installation and reports what resources and permissions are accessed, or required. By creating this application we can gather valuable data on what resources have been accessed during this installation process, and diagnose whether those applications are considered to be high-risk applications based on their possible vulnerabilities. The app reports a sliding scale number of vulnerability risk.

This document is currently not available here.

Share

COinS
 

Mobile Application Security

As mobile applications become widely used, they have become targets for computer criminals to exploit. To help understand the extent of resources that an Android application uses during the installation process, we have built an application that observes the installation and reports what resources and permissions are accessed, or required. By creating this application we can gather valuable data on what resources have been accessed during this installation process, and diagnose whether those applications are considered to be high-risk applications based on their possible vulnerabilities. The app reports a sliding scale number of vulnerability risk.