ARCHITECTURE SECURITY PRINCIPLES OF THE ANDROID APPLICATIONS-BASED INFORMATION SYSTEM

Authors

DOI:

https://doi.org/10.28925/2663-4023.2020.8.4960

Keywords:

Android; application security; information system architecture; mobile application; mobile security; attack surface; security model

Abstract

In this article common attack vectors on the information systems, which are based on the Android client applications, are observed, analyzed and compared. The purpose of this analysis consists in creating the theoretical base for development the practical principles of securing the architecture level of such systems. To accomplish the aims set, there was conducted the categorization of attacks and vulnerabilities specific to the Android information infrastructure and environment. There were also conducted analysis of Android application functional components and typical underlying infrastructure which have possible impact on a system security. Available data about the widespread vulnerabilities of the described elements was analyzed in context of possible exploitation. Based on the Android application usage model there were figured out several adversary models and attack vectors related to the researched information system type. Developed adversary models were formed with a focus on technical possibilities and threat abstraction. Mentioned vectors can be used by an attacker to violate the confidentiality and integrity of critical information in the system. The carried out research was used to form the characteristic comparison of the mentioned vectors and adversary models to evaluate the attack surface on the different parts of information system represented as attack vectors. As a result, we have developed the theoretical principles for securing the architecture of Android applications-driven information systems. Achieved results can be used to form the threat and adversary model, create practical recommendations for the information risk reducing practices in Android-applications driven information systems and to develop the technical requirements for security testing and development.

Downloads

Download data is not yet available.

References

W. Enck, D. Octeau, P. McDaniel and S. Chaudhuri, "A Study of Android Application Security", 2011. (in English)

I. Leshhakov, "Corporative information system architecture", Molodoj uchenyj, vol. 1, no. 155, pp. 13-15, 2017. [Accessed 10 March 2020]. (in Russian)

Z. Joerg, Architecture of Interoperable Information Systems - An enterprise Model-based Approach for Describing and Enacting Collaborative Business Processes. 2012, pp. 1-3. (in English)

V. Kopytov, A. Shulgin and S. Fedorov, " DEVELOPMENT OF THE ARCHITECTURE INTEGRATION ENVIRONMENT CROSS-PLATFORM MOBILE APPLICATIONS WITH CORPORATE INFORMATION SYSTEMS ", Mezhdunarodnyj nauchno-issledovatel'skij zhurnal, vol. 1, no. 38, 2015. [Accessed 10 March 2020]. (in Russian)

R. Al-Sayyed, S. Manaseer and O. Rababeh, "Mobile Information System, How to Build with Case Study", International Journal of Interactive Mobile Technologies (iJIM), vol. 4, no. 4, 2010. Available: 10.3991/ijim.v4i4.1357 [Accessed 10 March 2020]. (in English)

A. Jørgensen, The Future of the Mobile Application Market. Trondheim: Norwegian University of Science and Technology, 2014, pp. 29-34. (in English)

S. Chatterjee, K. Paul, R. Roy and A. Nath, "A Comprehensive Study on Security issues in Android Mobile Phone — Scope and Challenges", International Journal of Innovative Research in Advanced Engineering, vol. 3, no. 3, 2016. [Accessed 10 March 2020]. (in English)

B. Schmerl et al., "Architecture Modeling and Analysis of Security in Android Systems", Software Architecture, pp. 274-290, 2016. Available: 10.1007/978-3-319-48992-6_21 [Accessed 10 March 2020]. (in English)

S. Khan and I. Firdous, "Review on Android App Security", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 4, pp. 225-228, 2017. Available: 10.23956/ijarcsse/v7i4/0195 [Accessed 10 March 2020]. (in English)

J. Six, Application security for the Android platform. Beijing: O'Reilly, 2012. (in English)

P. Manadhata, K. Tan, R. Maxion and J. Wing, "An Approach to Measuring a System's Attack Surface", 2007. Available: 10.21236/ada476977 [Accessed 10 March 2020]. (in English)

Q. Do, B. Martini and K. Choo, "The role of the adversary model in applied security research", Computers & Security, vol. 81, pp. 156-181, 2019. Available: 10.1016/j.cose.2018.12.002 [Accessed 10 March 2020]. (in English)

European Maritime Safety Agency, "System and Application Technical Landscape", 2014.

P. Gadient, M. Ghafari and O. Nierstrasz, Web APIs in Android through the Lens of Security. 2020. (in English)

NIST, "Guide to Secure Web Services", Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, 2007. (in English)

F. Sun, L. Xu and Z. Su, "Detecting Logic Vulnerabilities in E-commerce Applications", Proceedings 2014 Network and Distributed System Security Symposium, 2014. Available: 10.14722/ndss.2014.23351 [Accessed 10 March 2020]. (in English)

"OWASP Top Ten", Owasp.org, 2017. [Online]. Available: https://owasp.org/www-project-top-ten/. [Accessed: 10- Mar- 2020]. (in English)

S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner and B. Freisleben, "Why eve and mallory love android", Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12, 2012. Available: 10.1145/2382196.2382205 [Accessed 10 March 2020]. (in English)

Downloads


Abstract views: 657

Published

2020-06-25

How to Cite

Drahuntsov, R., Rabchun, D., & Brzhevska , Z. (2020). ARCHITECTURE SECURITY PRINCIPLES OF THE ANDROID APPLICATIONS-BASED INFORMATION SYSTEM. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(8), 49–60. https://doi.org/10.28925/2663-4023.2020.8.4960