SlideShare uma empresa Scribd logo
1 de 17
SMARTPHONE SECURITY AND
CONTACT SYNCHRONIZATION
AUTHORS
Kunal Gupta, Ravi Kumar, Sachin Loothra
Presented by : Ravi Kumar
Amity University, Noida
Current Scenario – About Smartphone Theft
• Every year, smartphones costing $30 billion are
lost/stolen.
• Worst part – most of these smartphone theft cases
remain unsolved, and yet no interest in solving this
problem from manufacturers of these smart gadgets.
• Smartphone Theft – fastest growing undetectable
crime.
Have you ever wondered ?
What would happen if you lost/changed your
smartphone?
• Contacts Lost
• Transferring Contacts.
SSCS : A complete solution to above problems
The “Smartphone Security & Contact Synchronization (SSCS)” is an
innovative idea that will serve to solve the following challenging
problems regarding smartphones:-
Help the smartphone owner to track his/her lost android
smart phone.
Solve the problem of smartphone owner’s credentials being
exposed/ leaked.
Solve the problem of losing/transferring contacts when you
lose/change your smart phones.
Informing your friends about your new contact after you change
your SIM Card.
Remotely control your device.
Find phone by making it ring/vibrate even in silent mode.
Proposed System
The idea is to develop an online service and an android
smartphone application that works together. The application
aims to solve the problem of losing mobile contacts by
maintaining its contact details automatically in an online contact
base ie Google Spreadsheet. Google Docs API will be used for
this.
With this application, each contact on a user’s smartphone is
synchronized with it, and each time the user changes his/her
mobile number, every synchronized contact will receive a
message or an e-mail about user’s updated contact
information.
Proposed System
From a security point of view, the main motive of the
application is to keep a track of our mobile handset and catch
the thief. With this application, the original mobile user can
track his/her lost mobile phone. And if a malicious user
changes the SIM Card, his mobile number will be sent to the
alternate numbers entered by the original user at the time of
application installation. A special code messaged from any
mobile number will initiate the GPS tracking.
The Siren Feature will help to trace the smartphone despite it
being in the silent mode.
Contact Synchronization
Use Case Diagram
FLOW CHARTS – Mobile Safety/Security
1) SIM Change Detection
2) GPS Tracking Activation/Deactivation
3) Siren Functionality
3) Inform to Friends
Uniqueness About Our Application
The situation right now is that most smartphone developers are working on
better hardware of devices. Due to this, a few basic facilities that every
smartphone should have, i.e. anti theft security, contracts synching problem
etc., is being overlooked.
Even though, there are many 3rd party applications on the play store which
try to provide facilities for contact synchronization, smartphone security.
However, they have their limitations too:-
• Not a complete package.
• Lack multi-purpose capability.
• Storage Issues.
A complete solution all packed in a single application with no hassles is still
not available on the Google PlayStore.
SCREENSHOTS
1 2
3 4 5
Future Scope
Great present & marvelous future ahead :
• We can have a complete backup of messages, call
history etc. into the Google spreadsheet.
• The feature to automatically capture thief’s photo
when he/she logins to the smartphone for the first
time.
• The ADB Lock feature.
• Wipe Data/Factory Reset Protection can be added
to enhance application’s capability.
References
1. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application
Security. In: Proceedings of the 20th USENIX Security Symposium
(August 2011).
2. Wang, H.J., Zhu, W.: Smart-Phone Attacks and Defenses. In: Proceedings of the 3rd
Workshop on Hot Topics in Networks (HotNets) (2004).
3. Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security
& Privacy Magazine 7(1), 50–57 (January/February 2009).
4. Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-Powered Mobile Devices Using
SELinux. IEEE Security and Privacy Magazine (May/June 2010).
5. Android Developers - The official site for Android developers. Provides the Android
SDK and documentation for app developers and designers
(http://developer.android.com). Referred throughout the implementation of the
suggested project.
6. A question & answer site. (2008, August). Retrieved June 10, 2013, from stackoverflow
:http://stackoverflow.com/questions/tagged/android
Smartphone security and contact synchronization(paper id1569866867)

Mais conteúdo relacionado

Destaque

8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEM8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEMArun Raj
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
 
Location based reminder
Location based reminderLocation based reminder
Location based reminderjunnubabu
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.iCreateWorld
 
Location Based services
Location Based servicesLocation Based services
Location Based servicesFraj Alshahibi
 
8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera System8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera SystemPrejith Pavanan
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsUsman Sait
 

Destaque (8)

8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEM8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEM
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Location based reminder
Location based reminderLocation based reminder
Location based reminder
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Location Based services
Location Based servicesLocation Based services
Location Based services
 
8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera System8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera System
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Smartphone security and contact synchronization(paper id1569866867)

  • 1. SMARTPHONE SECURITY AND CONTACT SYNCHRONIZATION AUTHORS Kunal Gupta, Ravi Kumar, Sachin Loothra Presented by : Ravi Kumar Amity University, Noida
  • 2. Current Scenario – About Smartphone Theft • Every year, smartphones costing $30 billion are lost/stolen. • Worst part – most of these smartphone theft cases remain unsolved, and yet no interest in solving this problem from manufacturers of these smart gadgets. • Smartphone Theft – fastest growing undetectable crime.
  • 3. Have you ever wondered ? What would happen if you lost/changed your smartphone? • Contacts Lost • Transferring Contacts.
  • 4. SSCS : A complete solution to above problems The “Smartphone Security & Contact Synchronization (SSCS)” is an innovative idea that will serve to solve the following challenging problems regarding smartphones:- Help the smartphone owner to track his/her lost android smart phone. Solve the problem of smartphone owner’s credentials being exposed/ leaked. Solve the problem of losing/transferring contacts when you lose/change your smart phones. Informing your friends about your new contact after you change your SIM Card. Remotely control your device. Find phone by making it ring/vibrate even in silent mode.
  • 5. Proposed System The idea is to develop an online service and an android smartphone application that works together. The application aims to solve the problem of losing mobile contacts by maintaining its contact details automatically in an online contact base ie Google Spreadsheet. Google Docs API will be used for this. With this application, each contact on a user’s smartphone is synchronized with it, and each time the user changes his/her mobile number, every synchronized contact will receive a message or an e-mail about user’s updated contact information.
  • 6. Proposed System From a security point of view, the main motive of the application is to keep a track of our mobile handset and catch the thief. With this application, the original mobile user can track his/her lost mobile phone. And if a malicious user changes the SIM Card, his mobile number will be sent to the alternate numbers entered by the original user at the time of application installation. A special code messaged from any mobile number will initiate the GPS tracking. The Siren Feature will help to trace the smartphone despite it being in the silent mode.
  • 8. FLOW CHARTS – Mobile Safety/Security 1) SIM Change Detection
  • 9. 2) GPS Tracking Activation/Deactivation
  • 11. 3) Inform to Friends
  • 12. Uniqueness About Our Application The situation right now is that most smartphone developers are working on better hardware of devices. Due to this, a few basic facilities that every smartphone should have, i.e. anti theft security, contracts synching problem etc., is being overlooked. Even though, there are many 3rd party applications on the play store which try to provide facilities for contact synchronization, smartphone security. However, they have their limitations too:- • Not a complete package. • Lack multi-purpose capability. • Storage Issues. A complete solution all packed in a single application with no hassles is still not available on the Google PlayStore.
  • 14. 3 4 5
  • 15. Future Scope Great present & marvelous future ahead : • We can have a complete backup of messages, call history etc. into the Google spreadsheet. • The feature to automatically capture thief’s photo when he/she logins to the smartphone for the first time. • The ADB Lock feature. • Wipe Data/Factory Reset Protection can be added to enhance application’s capability.
  • 16. References 1. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium (August 2011). 2. Wang, H.J., Zhu, W.: Smart-Phone Attacks and Defenses. In: Proceedings of the 3rd Workshop on Hot Topics in Networks (HotNets) (2004). 3. Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security & Privacy Magazine 7(1), 50–57 (January/February 2009). 4. Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy Magazine (May/June 2010). 5. Android Developers - The official site for Android developers. Provides the Android SDK and documentation for app developers and designers (http://developer.android.com). Referred throughout the implementation of the suggested project. 6. A question & answer site. (2008, August). Retrieved June 10, 2013, from stackoverflow :http://stackoverflow.com/questions/tagged/android