Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
نویسندگان
چکیده
منابع مشابه
investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances
در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...
User - oriented Security Supporting Inter -
Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources across the Internet from functional genomics resources through to epidemiological studies. The Grid paradigm provides a compelling model whereby seamless access to these resources can be achieved. However, the acceptance of G...
متن کاملSleeping Android: Exploit through Dormant Permission Requests
I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work.
متن کاملApp-Ray: User-driven and fully automated Android app security assessment
Android is currently the prevailing mobile operating system accompanied by a huge number of apps available at various online market platforms. To protect against malicious or vulnerable apps, Android comprises a permission-based security model and some, but yet opaque security checks conducted by Google Play. Under these conditions, assessing the security of an app according to user-specific re...
متن کاملSecurity Challenges for User-Oriented RFID Applications
In this article, we examine the role played by RFID in enabling user-oriented networked applications. We explain why RFID is seen to be an important building block of the ‘Internet of Things’ and examine how RFID, assisted by the deployment of NFC devices, is increasingly facilitating useroriented, Internet-based application architectures. Finally, we look at the high-level security challenges ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2020
ISSN: 0167-4048
DOI: 10.1016/j.cose.2019.101685