Android phone security

In this report, a detailed analysis and explanation of the project will be discussed. It shall serve as a progress guide for project supervisors on the progress of the project. The report shall highlight the work accomplished, achievements and difficulties encountered. The project kick started off...

Full description

Saved in:
Bibliographic Details
Main Author: Ong, Daniel Zhong Cheng
Other Authors: Ng Wee Keong
Format: Final Year Project
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/66676
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-66676
record_format dspace
spelling sg-ntu-dr.10356-666762023-03-03T20:54:12Z Android phone security Ong, Daniel Zhong Cheng Ng Wee Keong School of Computer Engineering DRNTU::Engineering In this report, a detailed analysis and explanation of the project will be discussed. It shall serve as a progress guide for project supervisors on the progress of the project. The report shall highlight the work accomplished, achievements and difficulties encountered. The project kick started off in researching for vulnerabilities on Android device. For this project, it is important to know the framework of Android as this helps in understanding of how Android Operating System (OS) works. The next step is to learn about the built-in security features of Android OS. With the knowledge and hypothesis of a secured Android OS, it is key to find out how Android devices can be compromised even with the security features in placed. The project experiment is done on a Samsung S4 phone running on CyanogenMod CM11 - Android OS version 4.4.4. In this project, 4 different types of vulnerabilities that might cause theft of phone information are focused on. There are numerous known vulnerabilities with phone running on Android OS but not all vulnerabilities will lead to theft of phone information such as denial of service. Thus, the focus of this project is on those vulnerabilities that cause a phone to lose its confidentiality. Pertaining to the Project Plan, the project scope includes understanding the architecture of Android OS, Android OS security and penetration testing of the possible vulnerabilities. For a successful test case, the phone contacts and text messages are extracted out through the vulnerability. At the end of this project, a list of mitigating factors is complied. This will help readers of this project to fully appreciate the importance of preventing attacks on their Android devices. The results of the four experiments were accurate in contrast with the Android version used, two of which produced successful results. Based on the results, a clear conclusion is drawn – Android OS is built with good security features but it is users that compromise security. Security is only as strong as the weakest link. Bachelor of Engineering (Computer Science) 2016-04-20T09:09:32Z 2016-04-20T09:09:32Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/66676 en Nanyang Technological University 37 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Ong, Daniel Zhong Cheng
Android phone security
description In this report, a detailed analysis and explanation of the project will be discussed. It shall serve as a progress guide for project supervisors on the progress of the project. The report shall highlight the work accomplished, achievements and difficulties encountered. The project kick started off in researching for vulnerabilities on Android device. For this project, it is important to know the framework of Android as this helps in understanding of how Android Operating System (OS) works. The next step is to learn about the built-in security features of Android OS. With the knowledge and hypothesis of a secured Android OS, it is key to find out how Android devices can be compromised even with the security features in placed. The project experiment is done on a Samsung S4 phone running on CyanogenMod CM11 - Android OS version 4.4.4. In this project, 4 different types of vulnerabilities that might cause theft of phone information are focused on. There are numerous known vulnerabilities with phone running on Android OS but not all vulnerabilities will lead to theft of phone information such as denial of service. Thus, the focus of this project is on those vulnerabilities that cause a phone to lose its confidentiality. Pertaining to the Project Plan, the project scope includes understanding the architecture of Android OS, Android OS security and penetration testing of the possible vulnerabilities. For a successful test case, the phone contacts and text messages are extracted out through the vulnerability. At the end of this project, a list of mitigating factors is complied. This will help readers of this project to fully appreciate the importance of preventing attacks on their Android devices. The results of the four experiments were accurate in contrast with the Android version used, two of which produced successful results. Based on the results, a clear conclusion is drawn – Android OS is built with good security features but it is users that compromise security. Security is only as strong as the weakest link.
author2 Ng Wee Keong
author_facet Ng Wee Keong
Ong, Daniel Zhong Cheng
format Final Year Project
author Ong, Daniel Zhong Cheng
author_sort Ong, Daniel Zhong Cheng
title Android phone security
title_short Android phone security
title_full Android phone security
title_fullStr Android phone security
title_full_unstemmed Android phone security
title_sort android phone security
publishDate 2016
url http://hdl.handle.net/10356/66676
_version_ 1759854319104950272