Formal Analysis of Android's Permission-Based Security Model
نویسندگان
چکیده
منابع مشابه
Automated Analysis of Permission-Based Security Using UMLsec
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions enforce certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We present research towards a tool which ...
متن کاملFormal integrated network security analysis tool: formal query-based network security configuration analysis
105 Formal integrated network security analysis tool: formal query-based network security configuration analysis Soumya Maity1, P. Bera2, Soumya K. Ghosh1, Ehab Al-Shaer3 School of Information Technology, Indian Institute of Technology, Kharagpur 721302, India School of Electrical Sciences, Indian Institute of Technology, Bhubaneswar 751013, India Department of Software and Information Systems,...
متن کاملPermission based Android security: Issues and countermeasures
Android security has been a hot spot recently in both academic research and public concerns due to numerous instances of security attacks and privacy leakage on Android platform. Android security has been built upon a permission based mechanism which restricts accesses of third-party Android applications to critical resources on an Android device. Such permission based mechanism is widely criti...
متن کاملFormal Security Protocol Analysis
Not all of the protocol security flaws described at the SSR2014 conference were discovered using these new automated techniques. Several significant findings were the result of more traditional methods. These findings included flaws in standardized and deployed protocols, as well as important innovations to improve and extend the capabilities of long-used cryptographic techniques. Based on thes...
متن کاملFormal Analysis of Security APIs
An Application Program Interface (API) is considered a security API when it is designed not only to offer access to functionality but also to enforce a security policy, i.e. no matter what commands are sent to the interface, some security properties continue to hold. They are used, for example, as interfaces to cryptographic hardware modules and smartcards. They are very difficult to design, an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Annals of Computer Science
سال: 2016
ISSN: 2248-2695
DOI: 10.7561/sacs.2016.1.27