چكيده به لاتين
In the recent years, more portable devices are being used for their convenience. By the beginning of year 2016, Android devices consisted about %60 of portable device and %75 by the end of 2017. One of the main concerns of these devices in authenticating new accounts, is session hijacking that can happen for various reasons, such as transmitting authentication data through an unsecure connection. This thesis aims to introduce a new method of authentication that not only uses a username and password pair, but also creates a device signature using installed packages, device movements, list of the accounts, and static features of that device. This signature will be sent alongside the login session to ensure device identity. To create a behavior pattern of an android device, 193 devices were monitored for at least 14 days. Every minute, signature information was extracted from each device and was sent to our dedicated server. After that, ten imitation scenarios were designed to evaluate this method. This method can distinguish attacks with the accuracy of 78% and false positive rate of %0.9 under these conditions: Imitating all static features, 15% of accounts installed on victim’s device, imitating IP address, 30% of the installed packages (applications) and stand within 20-25 meters of distance to the victim’s device.