Services in Android can Share Your Personal Information in Background

نویسندگان

  • Manoj Kumar
  • Sheshendra Rathi
چکیده

Mobile phones have travelled a very long journey in a very short span of time since its inception in 1973. This wonderful toy of 20 century has started playing significant role in people’s life. More than 5 billion mobile users are there around the world and almost 90% of the entire earth is under the mobile coverage now. Today’s smart phones are equipped with numerous features, faster processors and high storage capacity. Android is a latest trend in this series whose popularity is growing by leaps and bounds. Android has a number of components which helps Application developers to embed distinguish features in applications. This paper explains how the Service component of Android can share your personal information to others without users’ interaction. Keywords— Mobile phones, Android, service component, mobile applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Android Security , Pitfalls , Lessons Learned and BYOD Technical report

Over the last two years Android became the most popular mobile operating system. But Android is also targeted by an over-proportional share of malware. In this paper we systematize the knowledge about the Android security mechanisms and formulate how the pitfalls can be avoided when building a mobile operating system. As smartphones enter the corporate domain, a new scheme called bring your own...

متن کامل

Trusted Cells: A Sea Change for Personal Data Services

How do you keep a secret about your personal life in an age where your daughter’s glasses record and share everything she senses, your wallet records and shares your financial transactions, and your set-top box records and shares your family’s energy consumption? Your personal data has become a prime asset for many companies around the Internet, but can you avoid -or even detect -abusive usage?...

متن کامل

Musubi: A Decentralized Mobile Social Web

With the rise of cloud services, users’ personal data, from photos to bank transactions, are scattered and hosted by a variety of application service providers. Communication services like email and social networking, by virtue of helping users share, have the unique opportunity to gather all data shared in one place. As users shift their communication medium from email to social networks, pers...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags

Nowadays privacy in the connected world is a big user’s concern. The ubiquity of mobile devices permits billions of users browse the web at anytime, anywhere. Near Field Communication (NFC) appeared as a seamlessly and simply communication protocol between devices. Commercial services such as Android Pay, and Apple Pay offer contactless payment methods that are spreading in more and more scenar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1308.4486  شماره 

صفحات  -

تاریخ انتشار 2011