Manjiri M. Bole, Yogini S. Chavan, Arif J. Shaikh, Saurabh D. Chikhale
Computer Department, K.J.C.O.E.M.R
Computer Department, K.J.C.O.E.M.R
Computer Department, K.J.C.O.E.M.R
Computer Department, K.J.C.O.E.M.R.
Abstract — In this paper, we propose a MAC-based remote lock and wipe system through the SMS push notification to protect against the private data disclosure when smart phone is lost or stolen. The proposed system provides the integrity checking mechanism so that the malicious users are unable to launch denialof- service attacks which send the lock or wipe commands to the normal users on purpose. Also, it satisfies the SMS length limitation of 80 bytes long without downgrading the security level. …show more content…
As an application cannot misappropriate data it does not have access to the frequency with which applications request access to reach type of potentially sensitive data was studied then determined the frequency with applications ex filtrate data of each type and where they send the data to. Mis appropriation: Prior work has revealed that some Android applications do exploit user data for purposes that may not be expected nor desired by users. Enck et al., who developed the Taint Droid information-flow tracking system extended in our work, used this system to analyze 30 Android applications that required access to the Internet and either users’ loc ation, camera, or microphone. They found that half of these applications shared users’ locations with advertisement servers. The problem is not unique to Android. Egele et al. used static analysis to track information flow in popular iPhone applications and discovered that many contained code to send out the unique device ID. Smith captured network traffic to observe iPhone applications transmitting device IDs. The Wall Street Journal commissioned its own study of 50 iPhone applications and 50 Android applications, also using a network-observation approach . The article suspects that these unique IDs are so commonly transmitted because they can be used to profile users’ behaviors across …show more content…
Here, there is no client component so the user has to message the ‘$’ symbol followed by remote connection command from the mobile’s messaging interface. Server service will distinguish the command from the smart phone’s application and normal SMS by the first two character of the message. Depending on this, the response will be made. In this case, response won’t be encrypted and it will be sent back as a SMS to the user. Response can be the contact information stored the smart phone, an incoming call number,