GARMDROID: IoT potential security threats analysis through the inference of android applications hardware features requirements

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Applications and services based on the Internet of Things (IoT) are increasingly vulnerable to disruption from attack or information theft. Developers and researchers attempt to prevent the growth of such disruption models, mitigate and limit their impact. Meeting these challenges requires understanding the characteristics of things and the technologies that empower the IoT since traditional protection mechanisms are not enough. Moreover, as the growth in mobile device market is pushing the deployment of the IoT, tools and mechanisms to evaluate, analyze and detect security threats in these devices are strongly required. In this context, this paper presents a web tool, named GARMDROID, aimed to help IoT software developers and integrators to evaluate IoT security threats based on the visualization of Android application hardware requests. This procedure is based on the static analysis of permissions requested by Android applications.

Original languageEnglish
Title of host publicationApplications for Future Internet - International Summit, AFI 2016, Revised Selected Papers
EditorsOscar Mayora, Enrique Sucar, Enrique Muñoz de Cote, Enrique Muñoz de Cote
PublisherSpringer Verlag
Pages63-74
Number of pages12
ISBN (Print)9783319496214
DOIs
StatePublished - 2017
EventInternational Summit on Applications for Future Internet, AFI 2016 - Puebla, Mexico
Duration: 25 May 201628 May 2016

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume179 LNICST
ISSN (Print)1867-8211

Conference

ConferenceInternational Summit on Applications for Future Internet, AFI 2016
Country/TerritoryMexico
CityPuebla
Period25/05/1628/05/16

Keywords

  • Android
  • Internet of Things
  • Security threats

Fingerprint

Dive into the research topics of 'GARMDROID: IoT potential security threats analysis through the inference of android applications hardware features requirements'. Together they form a unique fingerprint.

Cite this