ph-neutral header
welcome talks guest_info party history imprint darklab phenoelit twist4

Android Application Sandbox

Abstract

Usage of smartphones in everyday life is getting more popular. While former mobile phones were mainly used only for phone calls, modern devices often have the ability to install third-party software and being connected to the internet. Along with these new possibilities there are also new attack vectors on the security of mobile devices.

One of the newer operating systems for such smartphones is Android. It is based on a Linux Kernel and set open source. Although there are still certain parallels to commonly used Linux environments, Google engineer Patrick Brady said "Android is not Linux". This might indicate that some special characteristics of Android and also the limitations of the used mobile hardware makes it harder to detect and react on malware attacks if using the same techniques as on personal computer environments.

There are a lot of ways detecting if an application is suspicious or not. One possibility is to scan the software for malicious patterns before it will be installed and another one is to execute the application in a fully isolated environment. The Android Application Sandbox (short AAS) is supposed to examine both, a static and a dynamic analysis, to automatically detect suspicious applications in a more efficient way as it is done until now.

One practical application of the gathered results is the faster and more secure detection of suspicious software in an Android application market as Google currently provides. Another one is the improvement of actually existing anti virus applications available for the Android operating system.

thomasbl