Northern Kentucky University
Mobile Application Security
Institution
Northern Kentucky University
Faculty Advisor/ Mentor
Maureen Doyle; James Walden
Abstract
As mobile applications become widely used, they have become targets for computer criminals to exploit. To help understand the extent of resources that an Android application uses during the installation process, we have built an application that observes the installation and reports what resources and permissions are accessed, or required. By creating this application we can gather valuable data on what resources have been accessed during this installation process, and diagnose whether those applications are considered to be high-risk applications based on their possible vulnerabilities. The app reports a sliding scale number of vulnerability risk.
Mobile Application Security
As mobile applications become widely used, they have become targets for computer criminals to exploit. To help understand the extent of resources that an Android application uses during the installation process, we have built an application that observes the installation and reports what resources and permissions are accessed, or required. By creating this application we can gather valuable data on what resources have been accessed during this installation process, and diagnose whether those applications are considered to be high-risk applications based on their possible vulnerabilities. The app reports a sliding scale number of vulnerability risk.