• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 14, Pages: 1-7

Original Article

Security Comparison of Android and IOS and Implementationof User Approved Security (UAS) for Android

Abstract

Background/Objectives: The widely spread Smartphone operating systems i.e. iOS and Android are loaded with the inherent security measures to protect their millions of users worldwide. Android, being familiar and popular in open supply mobile package i.e. open source platform has some security limitations or vulnerabilities which are also present in iOS that is owned by Apple and is a proprietary platform with some open supply parts. Methods/Statistical Analysis: We compare the basic protection options of Android and iOS, with the objective to combine the user approved security (UAS) model in Android so that we are able to grant permissions to access various resources on a Smartphone at the time of execution.Findings: In this paper we propose the implementation of a reverse engineering method that restricts Access of the resources and provides a requirement based procedure to access resources. Applications/Improvements: By incorporating the user approved security, the repackaged app would be more secure and will be capable of running on all the devices.

Keywords: Android, App, iOS, Mobile Package, Open-Supply, Repackaged App, Reverse-Engineering

DON'T MISS OUT!

Subscribe now for latest articles and news.