• DocumentCode
    1990852
  • Title

    Identifying and quantifying the android device users´ security risk exposure

  • Author

    Jeter, L. ; Mishra, Shivakant

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Colorado, Boulder, CO, USA
  • fYear
    2013
  • fDate
    28-31 Jan. 2013
  • Firstpage
    11
  • Lastpage
    17
  • Abstract
    The Android operating system has been designed to afford secure but unrestricted use of smartphones for the users. The crux of this solution is that the burden of system administration has been, possibly unknowingly, placed upon each individual user. As a result, an understanding of user behavior in terms of what security settings they typically use, what applications they download and what permissions they grant to these applications is critical to evaluate the security risk exposure of Android users. This paper presents an analysis of security-related user behavior data collected from over 375 distinct users over a period of four months. Based on this collected data, the paper identifies the significant threats Android users are faced with and recommends possible solutions. Combined with additional literary and product research, the paper identifies multiple shortcomings in the existing Android security landscape.
  • Keywords
    operating systems (computers); security of data; smart phones; Android device user; Android operating system; security risk exposure; security setting; security-related user behavior; smartphones; Androids; Bluetooth; Humanoid robots; IEEE 802.11 Standards; Operating systems; Security; Smart phones;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Networking and Communications (ICNC), 2013 International Conference on
  • Conference_Location
    San Diego, CA
  • Print_ISBN
    978-1-4673-5287-1
  • Electronic_ISBN
    978-1-4673-5286-4
  • Type

    conf

  • DOI
    10.1109/ICCNC.2013.6504045
  • Filename
    6504045