• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 113
Next 10 →

Lintent: towards security type-checking of Android

by Michele Bugliesi, Stefano Calzavara, Alvise Spanò, Università Ca, Foscari Venezia
"... Abstract. The widespread adoption of Android devices has attracted the attention of a growing computer security audience. Fundamental weaknesses and subtle design flaws of the Android architecture have been identified, studied and fixed, mostly through techniques from data-flow analysis, runtime pro ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
-and-effect system to statically prevent privilege escalation attacks on well-typed components. Drawing on our abstract framework, we develop a prototype implementation of Lintent, a security type-checker for Android applications integrated with the Android Development Tools suite. We finally discuss preliminary

Towards taming privilege-escalation attacks on Android

by Sven Bugiel, Lucas Davi, Ra Dmitrienko, Thomas Fischer - In Proceedings of the 19th Annual Network & Distributed System Security Symposium , 2012
"... Android’s security framework has been an appealing sub-ject of research in the last few years. Android has been shown to be vulnerable to application-level privilege esca-lation attacks, such as confused deputy attacks, and more recently, attacks by colluding applications. While most of the proposed ..."
Abstract - Cited by 78 (8 self) - Add to MetaCart
Android’s security framework has been an appealing sub-ject of research in the last few years. Android has been shown to be vulnerable to application-level privilege esca-lation attacks, such as confused deputy attacks, and more recently, attacks by colluding applications. While most

Towards unified authorization for Android

by Michael J. May, Karthik Bhargavan - in: 5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013), LNCS
"... Abstract. Android applications that manage sensitive data such as email and files downloaded from cloud storage services need to protect their data from malware installed on the phone. While prior security analyses have focused on protecting system data such as GPS locations from malware, not much a ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. Android applications that manage sensitive data such as email and files downloaded from cloud storage services need to protect their data from malware installed on the phone. While prior security analyses have focused on protecting system data such as GPS locations from malware, not much

Towards a Trustworthy Android Ecosystem

by Vaibhav Rastogi , 2015
"... Mobile devices have become ubiquitous and their sales proportions already exceed the sales of traditional personal computer systems such as desktops and laptops. The number of mobile devices will only increase, and perhaps at an even higher rate in the coming years. Non-traditional architecture, ope ..."
Abstract - Add to MetaCart
, operating environments, and other requirements necessitate rethinking of security and privacy solutions for mobile devices. Android is the most dominant mobile operating system and so this work makes an effort to-wards a trustworthy Android ecosystem. We use Android ecosystem as the umbrella term

An Empirical Study of Cryptographic Misuse in Android Applications

by Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel
"... Developers use cryptographic APIs in Android with the intent of securing data such as passwords and personal information on mobile devices. In this paper, we ask whether developers use the cryptographic APIs in a fashion that provides typical cryptographic notions of security, e.g., IND-CPA security ..."
Abstract - Cited by 19 (3 self) - Add to MetaCart
fashion that maximizes overall security. We then suggest specific remediations based on our analysis towards improving overall cryptographic security in Android applications. Categories and Subject Descriptors

A Characterization of Malicious Android Applications

by Lorenzo Gomez, Iulian Neamtiu - University of California, Riverside , 2011
"... Smartphones are becoming pervasive–2010 sales have jumped 55 % compared to 2009, and IDC estimates that 269 million units will be sold worldwide in 2010. Smartphone applications (apps) offer a wide range of financial, social, health, scientific, and even military capabilities on the go. However, mob ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
advantage of the rapid evolution and developer freedom of the Android market to exploit applications to gather security-sensitive data, enlist the phone into premium services, and more. To effectively thwart malicious apps, their behavior must be further studied and dissected to understand exactly what

Android the Open Source for Mobile Application

by Suyog Bhosale , Nilesh Pawar
"... Abstract: Android is one of the most popular most popular open source operating system for mobile platforms. Contemplating Android application development is great choice as per current market scenario. Tough there are plenty of advantages of associated with it. The Android app ecosystem is rich an ..."
Abstract - Add to MetaCart
for the Smartphone and it became basic need in all over the word. There are some advanced feature sin android Smartphone, with which user can easily share application via online market store i.e. Google market store. But still the security area is underdeveloped. This survey is about the current work done

Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis

by Damien Octeau, Patrick Mcdaniel, Somesh Jha, Re Bartel, Eric Bodden, Yves Le Traon - In USENIX Security Symposium , 2013
"... Many threats present in smartphones are the result of in-teractions between application components, not just ar-tifacts of single components. However, current tech-niques for identifying inter-application communication are ad hoc and do not scale to large numbers of ap-plications. In this paper, we ..."
Abstract - Cited by 31 (3 self) - Add to MetaCart
reduce the discovery of inter-component communication (ICC) in smartphones to an instance of the Interprocedural Distributive Envi-ronment (IDE) problem, and develop a sound static anal-ysis technique targeted to the Android platform. We ap-ply this analysis to 1,200 applications selected from the Play

NetworkProfiler: Towards Automatic Fingerprinting of Android Apps

by Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song
"... Abstract—Network operators need to have a clear visibility into the applications running in their network. This is critical for both security and network management. Recent years have seen an exponential growth in the number of smart phone apps which has complicated this task. Traditional methods of ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Abstract—Network operators need to have a clear visibility into the applications running in their network. This is critical for both security and network management. Recent years have seen an exponential growth in the number of smart phone apps which has complicated this task. Traditional methods

Security Based Electronic Toll Collection Using NFC and Android Application

by Supriya Sutar, Sayali Chopade, Arti Ekadari, Lomesh Ahire
"... Abstract-The electronic toll collection using RFID & android application is a technology that will allow user to make the payment of highway tolls automatically. This terminology will in turn save the time as well as the money by decreasing the waiting time as well as the queues of vehicles at t ..."
Abstract - Add to MetaCart
Abstract-The electronic toll collection using RFID & android application is a technology that will allow user to make the payment of highway tolls automatically. This terminology will in turn save the time as well as the money by decreasing the waiting time as well as the queues of vehicles
Next 10 →
Results 1 - 10 of 113
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University