Countermeasures for Security Vulnerability in Android
Ipta Thakur1, Guide-Shaily Jain2

1Ipta Thakur, Department of CSE, Chitkara University, (Delhi), India.
2Shaily Jain, Department of CSE, Chitkara University, Baddi (Himachal Pradesh), India.
Manuscript received on 11 June 2013 | Revised Manuscript received on 17 June 2013 | Manuscript Published on 30 June 2013 | PP: 235-238 | Volume-3 Issue-1, June 2013 | Retrieval Number: A0941063113/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The high speed penetration of Smartphone’s in the market with Android as the leading operating system makes the need for malware analysis on this platform an urgent and concerning issue. In our project we capitalize earlier approaches for dynamic analysis of location based and other suspicious permissions and classes which can cause vulnerability. Our framework has been demonstrated by analyzing the permissions those are vulnerable. Array list will be created on the basis of the permissions and names of classes, and then checked for vulnerabilities using automated approach and then assured through the manual cross checking for vulnerability.
Keywords: Android Security, Malware Analysis, Dynamic Analysis, Vulnerabilities.

Scope of the Article: Security Service Systems