DocumentCode
1990852
Title
Identifying and quantifying the android device users´ security risk exposure
Author
Jeter, L. ; Mishra, Shivakant
Author_Institution
Dept. of Comput. Sci., Univ. of Colorado, Boulder, CO, USA
fYear
2013
fDate
28-31 Jan. 2013
Firstpage
11
Lastpage
17
Abstract
The Android operating system has been designed to afford secure but unrestricted use of smartphones for the users. The crux of this solution is that the burden of system administration has been, possibly unknowingly, placed upon each individual user. As a result, an understanding of user behavior in terms of what security settings they typically use, what applications they download and what permissions they grant to these applications is critical to evaluate the security risk exposure of Android users. This paper presents an analysis of security-related user behavior data collected from over 375 distinct users over a period of four months. Based on this collected data, the paper identifies the significant threats Android users are faced with and recommends possible solutions. Combined with additional literary and product research, the paper identifies multiple shortcomings in the existing Android security landscape.
Keywords
operating systems (computers); security of data; smart phones; Android device user; Android operating system; security risk exposure; security setting; security-related user behavior; smartphones; Androids; Bluetooth; Humanoid robots; IEEE 802.11 Standards; Operating systems; Security; Smart phones;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Networking and Communications (ICNC), 2013 International Conference on
Conference_Location
San Diego, CA
Print_ISBN
978-1-4673-5287-1
Electronic_ISBN
978-1-4673-5286-4
Type
conf
DOI
10.1109/ICCNC.2013.6504045
Filename
6504045
Link To Document