Wednesday, 25 May 2016

Android Application Vulnerabity Scanner

It seems so long ago when all cell phones were capable of, was making a phone call. Smart phones have taken over the market in frenzy. Why shouldn’t they? Today email, social networking, banking – everything is possible on the go with smart phones. Smart phones come equipped with features like data, Wi-Fi, voice and GPS functions. 

The sudden growth in the number of applications available for smart phones does raise certain level of concern for the user’s security. A report by McAfee claims that the year 2011 will be the year when smart phones become targets for malicious software and hackers. 

The mobile security field is still at very nascent stage. According to a recent market survey 50% of the devices run Google’s Android operating system, 25% use Apple iOS, with the rest being shared by Blackberry, Symbian and others. In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around 260,000 devices. 

These applications, in the Android market, were malicious applications which contained Trojans hidden in pirated versions of legitimate applications. It is a description about why this application needs to develop. The following steps would be followed with their own logical outcomes. 

The developers compile the code with an Android package file. Then user downloads the APK files and install on device. During this some security issue created. While creating android application developer gives some permission. 

According to this permission application allow to access the recourses of device and data stored in device. Sometime this application contains some vulnerable permission. This type of application put user in trouble .

also this allows to use user personal details stored in devices without knowledge of user. This information may user’s password or bank details.

 Another security issue with application is sometimes application make some network calls in background without knowing to user.

 This also leads to misuse. As you can see, steps downloaded Application have security issues. These calls need to be analysed for information leaks. An attacker can grab this information and compromise a user session.

No comments:

Post a Comment

Thanks For Your Response