Malicious Android applications in the enterprise: What do they do and how do we fix it?

Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations

Abstract

Android applications are used in a variety of domains, including business, social, media, health, scientific, and even military. On one hand, enterprises can take advantage of the richness of Android applications to support their business needs. On the other hand, Android devices contain rich sensitive data-e.g., GPS location, photos, calendar, contacts, email, and files-which is critical to the enterprise and unauthorized access to this sensitive data can lead to serious security risks. In this paper, we describe the nature and sources of sensitive data, what malicious applications can do to the data, and possible enterprise solutions to secure the data and mitigate the security risks. The purpose of this paper is to raise employees' and enterprises' awareness and show that a suite of easy-to-implement measures can improve both employee and enterprise security.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
Pages251-254
Number of pages4
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012 - Arlington, VA, United States
Duration: Apr 1 2012Apr 5 2012

Publication series

NameProceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012

Other

Other2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
Country/TerritoryUnited States
CityArlington, VA
Period4/1/124/5/12

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'Malicious Android applications in the enterprise: What do they do and how do we fix it?'. Together they form a unique fingerprint.

Cite this