Framework
This project is utilises several frameworks.
Exploratory Research
From the outset, the aim of the project is to explore security of framework Permissions. Android security has been heavily researched, including Android Permissions. This project seeks to explore the topic further. (Sreejesh, Mohapatra, & Anusree, 2014)
Case Study
The use of case study implements a qualitative framework approach. As a case study, with a specific focus, as opposed to gathering statistically significant data, can be a powerful research tool (Gillham, 2010) Relying on proof of concept, through a variety of methods, the results of which have significant value. (Runeson & Höst, 2008)
Open Innovation
Open Innovation is the sixth generation of Innovation Models. The project is openly innovative in several ways, pooling publicly available resources. (du Preez & Louw, 2008) Exploring Android as an open source project, testing and giving a public proof of concept, using the joint efforts of researchers and programmers.
Building upon the current work of developers and researches, by trying to expose malware and discovery of zero day exploits, contributes towards the open innovation framework of the information technology.
Research
Two applications will be trialled and assessed in an experiment to find if they use a zero-day exploit. Initially, the testing is functional, investigating the applications by deploying onto an Android device. Followed by technical testing of source code de-compilation.
Limitations
Time and skill limit the study, within which to produce a Proof of Concept. The inability to find proof of the security flaw, does not preclude that there is one. (Al-Sharif et al., 2016) It is, also challenged by implementing mixed research methods and interpreting results objectively, particularly if there’s conflicting results. (Johnson & Onwuegbuzie, 2004)
All references and posts are in English. (M.J.WILKIN85, 2017)
Statement of Innovation
Mixed research methods foster innovative thinking (Runeson & Höst, 2008), with a dynamic and analytical planning phase. The bulk of the innovation is done in the planning phase (Runeson & Höst, 2008), so the project is born from inspirational and innovative, ideas and strategies.
To date, there have been no zero-day exploits discovered, that enable access to private data. This project tries to make ground breaking progress within the research community.