DOI QR코드

DOI QR Code

Overview of the Sambodana Project: Development of Mobile Communication Security System using Hardening Android

  • Received : 2022.12.05
  • Published : 2022.12.30

Abstract

The Sambodana project is a mobile communication security system development project using Hardening Android. The initial idea for this project is that information leakage occurs outside of a communications application with end-to-end cryptographic security. Android hardening prevents unwanted applications and bloatware from being installed, such as unavailable Google Play Store or install restrictions.

Keywords

Acknowledgement

We would like appreciate to the Matching Fund Program 2022 Batch 4 from Kedaireka, Directorate General of Higher Education, Ministry of Education, Culture, Research and Technology of the Republic of Indonesia for this grant and also great collaboration with our industrial partnership, PT Panca Anugrah Integrasindo.

References

  1. A. Kousar, S. Memon, and I. Ali Simming, "The pragmatic analysis of i ½i±Œ, i ½i± , ✌ Emojis by ESL learners in Verbal modalities: A case study of Whatsapp chat," IJCSNS International Journal of Computer Science and Network Security, vol. 20, no. 10, 2020, doi: 10.22937/IJCSNS.2020.20.10.25.
  2. D. Alghamdi, "On the Scale in the Kingdom of Saudi Arabia: Facebook vs. Snapchat," IJCSNS International Journal of Computer Science and Network Security, vol. 21, no. 12, 2021, doi: 10.22937/IJCSNS.2021.21.12.19.
  3. L. v. Casalo, C. Flavian, and S. Ibanez-Sanchez, "Influencers on Instagram: Antecedents and consequences of opinion leadership," J Bus Res, vol. 117, 2020, doi: 10.1016/j.jbusres.2018.07.005.
  4. M. Haffner, "Twitter," in Geographies of the Internet, 2020. doi: 10.4324/9780367817534-20.
  5. C. Montag, H. Yang, and J. D. Elhai, "On the Psychology of TikTok Use: A First Glimpse From Empirical Findings," Frontiers in Public Health, vol. 9. 2021. doi: 10.3389/fpubh.2021.641673.
  6. W. Mazurczyk, L. Caviglione, and S. Wendzel, "Recent Advancements in Digital Forensics, Part 2," IEEE Security and Privacy, vol. 17, no. 1. 2019. doi: 10.1109/MSEC.2019.2896857.
  7. L. A. Aljeraisy and A. Alsultan, "Android Operating System: Security Features, Vulnerabilities, and Protection Mechanisms," IJCSNS International Journal of Computer Science and Network Security, vol. 22, no. 11, 2022, doi: 10.22937/IJCSNS.2022.22.11.53.
  8. N. K. Kamarudin, N. S. Bismi, N. H. Ahmad Zukri, M. F. Mohd Fuzi, and R. Ramle, "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger," Journal of Computing Research and Innovation, vol. 5, no. 2, 2020, doi: 10.24191/jcrinn.v5i2.136.
  9. L. Laksminarti, "Kebijakan Pemerintah Dalam Perlindungan Hak Kekayaan Intelektual (HAKI) Di Indonesia," Pencerah Publik, vol. 5, no. 2, 2018, doi: 10.33084/pencerah.v5i2.1012.
  10. N. Rahmawati and A. Suzianti, "Development of Customized Balanced Readiness Level Assessment Prototype for Research Funding Instruments".
  11. P. Gilski and J. Stefanski, "Android OS: A Review," TEM Journal, vol. 4, no. 1, 2015.
  12. Y. Aafer, X. Zhang, and W. Du, "Harvesting inconsistent security configurations in custom android ROMs via differential analysis," in Proceedings of the 25th USENIX Security Symposium, 2016.
  13. M. Suleman, X. Zhong, and Y. Sun, "Empirical Research and Auxiliary Tool for Custom Android ROMs," in Proceedings - 2020 International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2020, 2020. doi: 10.1109/ISCEIC51027.2020.00011.
  14. S. S, "Developing Custom ROM based on Android using AOSP," Int J Res Appl Sci Eng Technol, vol. 8, no. 8, 2020, doi: 10.22214/ijraset.2020.30932.
  15. T. B. MohdAnis and S. Subramaniam, "Operating System: The Power of Android," International Journal of Science and Research (IJSR), vol. 3, no. 11, 2014.
  16. D. Yugandhar and J.Kiran Kumar, "A Study on Current Mobile Operating Systems," Int J Sci Eng Res, vol. 8, no. 5, 2017.
  17. W. Song et al., "Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization," in Proceedings of the ACM Conference on Computer and Communications Security, 2021. doi: 10.1145/3460120.3484544.