About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I

Research Article

Controlled Android Application Execution for the IoT Infrastructure

Download(Requires a free EAI acccount)
441 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-47063-4_2,
        author={Michael Johnstone and Zubair Baig and Peter Hannay and Clinton Carpene and Malik Feroze},
        title={Controlled Android Application Execution for the IoT Infrastructure},
        proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I},
        proceedings_a={IOT360},
        year={2017},
        month={1},
        keywords={Static malware analysis Dynamic malware analysis Android platform},
        doi={10.1007/978-3-319-47063-4_2}
    }
    
  • Michael Johnstone
    Zubair Baig
    Peter Hannay
    Clinton Carpene
    Malik Feroze
    Year: 2017
    Controlled Android Application Execution for the IoT Infrastructure
    IOT360
    Springer
    DOI: 10.1007/978-3-319-47063-4_2
Michael Johnstone1, Zubair Baig1,*, Peter Hannay1, Clinton Carpene1, Malik Feroze1
  • 1: Edith Cowan University
*Contact email: z.baig@ecu.edu.au

Abstract

Android malware has grown in exponential proportions in recent times. Smartphone operating systems such as Android are being used to interface with and manage various IoT systems, such as building management and home automation systems. In such a hostile environment the ability to test and confirm device health claims is important to preserve confidentiality of user data. This paper describes a study to determine whether an Android device could be secured to prevent malware from executing in parallel with trusted applications. The research also sought to determine whether the system image could be protected from unauthorised modifications. A prototype scheme for meeting the above requirements was developed and tested. It was observed that the prototype succeeded in preventing unauthorised modification to the system image of the test device. However, the prototype failed to prevent unauthorised IPC calls when in single process mode.

Keywords
Static malware analysis Dynamic malware analysis Android platform
Published
2017-01-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-47063-4_2
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL