Research Article

A Security Sandbox Approach of Android Based on Hook Mechanism

Table 1

APIs and risk levels defined by authors.

Evaluation Project Danger levelEvaluation ProjectDanger level

Virus scanninghighApply data to any backupmedium
Sensitive word InformationmediumApply Signature Not verifiedmedium
Advertising SDK DetectionlowSensitive function callsmedium
Third-party SDK detectionlowJava Layer Dynamic debugginglow
Java Code decompilehighLoad Dex from SDcardlow
So file crackhighImplicit invocation of intent componentslow
Tampering and two-time packaginghighWebView Remote Codehigh
Dynamic injection attackhighDatabase injectionhigh
Interface HijackinghighContentProvider Data Disclosurehigh
Input listeninghighEncryption method not safe to usehigh
HTTP Transport datahighHTTPS not verifiedmedium
WebView PlainText Store passwordhighDownload any apkmedium
PlainText digital certificatehighGlobal writable Internal filesmedium
Debug Log functionshighDDoSmedium
Resource File DisclosuremediumResidual test informationlow
Dynamic Debug AttacksmediumWebView Bypass Certificate validationlow
Activity Component ExportmediumUnsafe use of random numberslow
Service component ExportmediumIntent Scheme URLlow
Broadcast receiver Component ExportmediumFragment injection attacklow
Content Provider Component Exportmediumā€‰ā€‰