An evaluation model for information security of Android application based on analytic hierarchy process
- Resource Type
- Conference
- Authors
- Wan Yan; Wang Guolin; Feng Xiangyang
- Source
- 2016 World Automation Congress (WAC) World Automation Congress (WAC), 2016. :1-6 Jul, 2016
- Subject
- Aerospace
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineering Profession
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Information security
Androids
Humanoid robots
Smart phones
Privacy
Analytic hierarchy process
Analytical models
information security
evaluation model
android application
Analytic Hierarchy Process
CVE-CVSS
- Language
The traditional way used to protect the information security of Android applications is usually to detect external malicious applications or dangerous codes, which pays less attention to the test and enhancement of Android application's self-capability in the field of guaranteeing the information security. To safeguard information of Android application internally and externally, a kind of evaluation model based on analytic hierarchy process theory was carried out, given the fifteen principal criteria carried out by summary and analyses of vulnerabilities and design flaws which caused extensive influence on information security of Android applications these years. As for vulnerabilities and design flaws detected by the penetration test in Android applications, the proposed evaluation model can succeed to objectively and credibly evaluate the application's capability of defending information security threats and offer advices on how to maintain the information security of Android application.