Semantically rich application-centric security in Android
نویسندگان
چکیده
منابع مشابه
Application-centric security policies on unmodified Android
Google’s Android platform uses a fairly standard resource-centric permission model to protect resources such as the camera, GPS, and Internet connection. We claim that a much better permission model for developers and users would be application-centric, with a vocabulary that directly relates to application-level functionality, e.g., one permission could allow camera use, but only for barcode s...
متن کاملAndroid Application Development & Its Security
In this paper we will look at the Android platform and Android based mobile application development & its security. Further we will look to explore an Android application available in google play store My Notepad. This application is used to save notes by using easy direct manipulation. It is featured with functions as Voice Navigation and Voice Based Searching, it requires internet connection ...
متن کاملA Study of Android Application Security
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. We introduce the ded decompiler, which r...
متن کاملmyTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android
Smartphone operating systems provide designated databases and services for user’s private information (e.g., contacts data and SMS or location) that can be conveniently accessed by 3rd party apps through clearly defined APIs. The popular Android OS deploys a permission framework and a reference monitor to protect the interfaces of these security and privacy sensitive components. However, Androi...
متن کاملYou can't touch this: Consumer-centric android application repackaging detection
Application repackaging is a widely used method for malware distribution, revenue stealing and piracy. Repackaged applications are modified versions of original applications, that can potentially target large audiences based on the original application’s popularity. In this paper, we propose an approach for detecting repackaged applications. Our approach takes advantage of the attacker’s reluct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2011
ISSN: 1939-0114
DOI: 10.1002/sec.360