Semantically rich application-centric security in Android

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application-centric security policies on unmodified Android

Google’s Android platform uses a fairly standard resource-centric permission model to protect resources such as the camera, GPS, and Internet connection. We claim that a much better permission model for developers and users would be application-centric, with a vocabulary that directly relates to application-level functionality, e.g., one permission could allow camera use, but only for barcode s...

متن کامل

Android Application Development & Its Security

In this paper we will look at the Android platform and Android based mobile application development & its security. Further we will look to explore an Android application available in google play store My Notepad. This application is used to save notes by using easy direct manipulation. It is featured with functions as Voice Navigation and Voice Based Searching, it requires internet connection ...

متن کامل

A Study of Android Application Security

The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. We introduce the ded decompiler, which r...

متن کامل

myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android

Smartphone operating systems provide designated databases and services for user’s private information (e.g., contacts data and SMS or location) that can be conveniently accessed by 3rd party apps through clearly defined APIs. The popular Android OS deploys a permission framework and a reference monitor to protect the interfaces of these security and privacy sensitive components. However, Androi...

متن کامل

You can't touch this: Consumer-centric android application repackaging detection

Application repackaging is a widely used method for malware distribution, revenue stealing and piracy. Repackaged applications are modified versions of original applications, that can potentially target large audiences based on the original application’s popularity. In this paper, we propose an approach for detecting repackaged applications. Our approach takes advantage of the attacker’s reluct...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2011

ISSN: 1939-0114

DOI: 10.1002/sec.360