Controlled android application execution for the IoT infrastructure

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android malware has grown in exponential proportions in recent times. Smartphone operating systems such as Android are being used to interface with and manage various IoT systems, such as building management and home automation systems. In such a hostile environment the ability to test and confirm device health claims is important to preserve confidentiality of user data. This paper describes a study to determine whether an Android device could be secured to prevent malware from executing in parallel with trusted applications. The research also sought to determine whether the system image could be protected from unauthorised modifications. A prototype scheme for meeting the above requirements was developed and tested. It was observed that the prototype succeeded in preventing unauthorised modification to the system image of the test device. However, the prototype failed to prevent unauthorised IPC calls when in single process mode.

Cite

CITATION STYLE

APA

Johnstone, M. N., Baig, Z., Hannay, P., Carpene, C., & Feroze, M. (2016). Controlled android application execution for the IoT infrastructure. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 169, pp. 16–26). Springer Verlag. https://doi.org/10.1007/978-3-319-47063-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free