According to data from IDC, smart phone manufacturers shipped 100.9 million units in the fourth quarter of 2010, compared to 92.1 million units of PCs shipped worldwide. For the first time in history, smart phones are outselling personal computers. Their popularity can be partially attributed to the incredible functionality and convenience smart phones offered to end-users.
In fact, existing mobile phones are not simply devices for making phone calls and receiving SMS messages, but powerful communication and entertainment platforms for web surfing, social networking, GPS navigation, and online banking. The popularity of smart phones smart phones is also spurred by the proliferation of feature-rich devices as well as compelling mobile applications(or simply apps).
In particular, these mobile apps can be readily accessed and downloaded to run on smart phones from various app stores. For example, it has been reported that Google’s Android Market already hosts 150,000 apps as of February 2011 and the number of available apps has tripled in less than 9 months.
Not surprisingly, mobile users are increasingly relying on smart phones to store and handle personal data. Inside the phone, we can find current (or past) geo-location information smart phones about the user, phone call logs of placed and received calls, an address book with various contact information, as well as cached emails and photos taken with the built-in camera.
The type and the volume of information kept in the phone naturally lead to various concerns about the safety of this private information, including the way it is managed and accessed. Smart phones
This paper gives a short, yet comprehensive overview of the major Android security mechanisms and based on this we have concluded that while the Android message passing system promotes the creation of rich, collaborative applications, it also introduces the potential for attack if developers do not take precautions.
Outgoing communication can put an application at risk of Broadcast theft (including eavesdropping and denial of service ), data theft, result modification, and Activity and Service hijacking. Incoming communication can put an application at risk of malicious Activity and Service launches and Broadcast injection.
To read this external content in full, dowload the complete paper from the author archive online at IJCSNS.org.