Smart phone based Operating System
Sohail Abbas 047(BSIT)A
Mazhar Iqbal 041(BSIT)A
Zain tanveer 006(BSIT)A
Sohail Ahammad 040(BSIT)A
Department: computer science
At present there are many mobile phones become domestic product which was once extravagant product. The reason towards this change is attributed to its varied functionality, ease of use and utility. There are number of tasks performed on it like making call, sending or receiving SMS, music, billing, online shopping, online booking, playing games, web browsing, using different apps like whatsapp, facebook or Applock etc. Hence a large amount of user sensitive data is stored within the devices. Increased usage of smartphone has led towards higher concerns about security of user- private data. Thus, Android devices are a soft target for privacy intrusion. Whenever the user wants to install any application, firstly it’s the description and the application screenshots which provides an insight into its utility. The user reviews the description as well as a list of permission requests before its installation. As the types and rate of malicious attacks increases, the difficulty of examining in advance whether an app is malicious or not through its descriptions has increased manifolds. In this paper we have reviewed and examined android software stack and compared smartphone based operating system like android, iOS, blackberry",
General Terms Android, Operating System and Security Keywords Android software architecture; android; iOS; Symbian; blackberry; windows phone; webOS; Ubuntu; Firefox; Android Security.
1. INTRODUCTION Smartphones are now participating nearly in each and every sphere of life like business, education, workplace and healthcare. The Worldwide Mobile Communications Device Open Operating System Sales (WMCDOOS) provides total 104",898 to End Users by OS. There are over 1.3 million active applications. in Google Play App Store. Android is the first open source, Linux-based and modern mobile handset platform. Google developed it for handset manufacturers like T-Mobile, Sprint Nextel, Google, Intel, Samsung, etc. It offers to consumers a richer, less expensive, better mobile experience and various features like 3D, SQLite, Connectivity, WebKit, Dalvik and FreeType etc. Since android provides open source operating system; users and developers can get source code but only under the rules and conditions. Whenever the user wants to install any application, firstly its description as well as a list of permission requests is provided with an opportunity for review before its installation or cancel the installation if he or she finds that the permissions are too many or objectionable. The android operating system has its own well established android permission model, but intruders can supplements them by allowing the components to be changed within and across the applications through Intent communication mechanism due to which it has susceptibility for attacks by malwares. Android open source platform requires strong and complex security architecture to ensure security of user private data, personal information, application and network, but it has few constraints for developers which raises the security risk for the end users. This paper is to compare the latest smartphone operating system like android, iOS, blackberry, Symbian, windows phone, webOS, Ubuntu and firefox. The comparison between different smartphone operating system is done using different parameters like OS family, Environment and market share. After summing up findings through the comparison, the conclusion discuss which operating systems are in competition and draw some conclusions from it.
The android applications are at the topmost layer of the Android software stack. These comprise both the native applications and the third party applications. The native applications provide the basic Android implementation such as SMS client app, Dialer, Web browser and Contact manager. The third party applications are further installed by the developers, programmers while debugging/testing and user after purchasing the device.
RELATED WORK As android usage are increasing day by day, so android have emerged as an outstanding area of research in recent past. Research activities are concentrated in areas such as reverse engineering, clustering, machine learning, operating system and security and they have received a lot of attention. Since the proposed work is focused on operating system and security, this survey covers the above two areas with respect to smartphones based operating system. In 2014, Kaur , described the android architecture, android operating system and its key features. They also compared Android with different OS like iOS (Apple), Symbian (Nokia) & Blackberry OS (RIM). From their survey, they concluded that android is better than all other operating systems. However due to open source OS and unique features, android has some limitations which leads to malware attacks like virus, worms, spyware, adware and Trojan horse. International Journal of Computer Applications (0975 – 8887) Volume 121 – No.1, July 2015 19 In 2014, Okediran et. al, presented a review and comparative analysis of different technological platforms. They mainly reviewed six Smartphone based OSs like Android-Google, iOS-Apple, Windows Phone-Microsoft, Blackberry OS, webOS and Symbian OS-Nokia. They found that As android can run on all mobile devices becomes the most popular operating system all over the world/the world over. In 2014, Dabhi et. al, presented a detail review on latest and upcoming operating systems like IOS 7(Apple), Android 4.4 KitKat (Google) and windows 9 (Microsoft). They compared updated features, facilities, performance and verdict about these operating systems. From market share analysis during December 2013, They found that android got 81.3% and is the best Smartphone OS in the world today. In 2014, Arshad et. al. proposed a light weight taint analysis tool for android application named AT2. This tool performed static analysis on android applications (APKs) using reverse engineering techniques and taint-aware slicing. To analyze the structure of an application, it used program slicing technique for data flow analysis. It performed the program slicing on full class name and methods name of an android application. The information leakages were detected using taint analysis technique on sliced programs. At the end, it presented a user friendly detailed report of analysis performed on android applications (APKs); which helped to enhance the security of android applications. In 2013, Ahmed et. al. compared two most popular mobile operating system android and iOS in terms of security. They compared security features like Encryption, Data Storage Format, Application Sandboxing, Memory Randomization, and Built-in Antivirus in both Mobile OS. From comparison, they concluded that iOS is more secured than android OS. They also described some security points to keep the user- sensitive data safe on the respective Smartphones. In 2013, Sharma et. Al. discussed about the various mobile technologies like 1G, 2G and 3G along with the different mobile phones based on different OS available in the market. They mainly compared Symbian OS, BlackBerry OS, Android OS, iOS and Windows Phone according to Vendor, Programming Language and Application Store. They also differentiated iPhone from blackberry and Symbian. From the difference, they found that iPhone has more features and require less code to write its application. Due to this, iPhone causes fewer bugs. At the end, they concluded that android and apple are growing at a fast pace in the market. In 2013, Johnson et. al. presented a framework for revealing the software security, functionality and accessibility risks for handheld devices. This framework executed all the possible execution paths without any kind of user input; as well as libraries using static as well as dynamic code analysis. The output of static code analysis was used as an input for the execution of dynamic code analysis. A large number of android applications are tested to display its functionality and feasibility. This approach can be used for other purposes like program confirmation, mnemonic execution, coactive debugger and deep exploration of an android application.
CONCLUSIONS AND FUTURE SCOPE Smartphones like personal computer provides various functionalities like use of application, usability, web browsing, running GPS, expendable memory; multitasking, multiprocessing, playing games, social networking etc. In this paper, we have presented a detail review and comparative analysis of different Smartphones operating systems. We have made comparison between android, iOS, Symbian, Blackberry, Windows Phone, WebOS, Ubuntu and Firefox. For comparison, various parameters of existing work like OS family, IDE, GUI, SDK platform, CPU Architecture, etc. and some new parameters like Market Size, Market share, Debugger availability, Cross platform deployment, Reverse Engineering tool, future Scope etc. have been considered. Because these parameters provides new research trends of smartphone based operating systems. From comparative analysis and market share analysis during fourth quarter of 2014, we have found that android and Windows Phones are superior to others OS. Android gets 80.7% and is the best Smartphone OS in the world today. We can also use it as an Educational tool. Due to android as an open source operating system, the user can easily install third party applications from markets and even from unreliable sources. Due to this, it has some limitations which lead to malware attacks like virus, worms, spyware, adware and Trojan horse. So, we propose detection of malware before installation of an application as well as comparison of android, iOS, Symbian, Blackberry, Windows Phone, WebOS, Ubuntu and Firefox Smartphones OS in terms of security
 Parmjit Kaur, and Sumit Sharma. "Google Android a mobile platform: A review." Engineering and Computational Sciences (RAECS), 2014 Recent Advances in. IEEE, 2014.
 Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf, "Mobile security catching up? revealing the nuts and bolts of the security of mobile devices.", Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, 2011.
 “Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012
 "Number of apps available in leading app stores as of July 2014.
 Drago¸s Sbırlea, Michael G. Burke, Salvatore Guarnieri, Marco Pistoia, and Vivek Sarkar, "Automatic detection of inter-application permission leaks in Android applications." IBM Journal of Research and Development 57.6 (2013): 10-1.
 Okediran O. O., Arulogun O. T. and Ganiyu R. A, A Survey." Int. J. Advanced Networking and Applications 6.1 (2014): 2195-2201. [7“ART AND DALVIK.
Dabhi, Rajendra M., and Sunil Kumar V. Nakum. "A Paper on Latest and Upcoming Smartphone OS." International Journal 4.4 (2014).
 Syed Arshad and Ashwin Kumar, “Android Application Analysis using Reverse Engineering Techniques.