메뉴 건너뛰기




Volumn , Issue , 2011, Pages 51-62

Practical and lightweight domain isolation on android

Author keywords

access control; android; domain isolation; enterprise

Indexed keywords

ANDROID; CONTEXT-BASED; DATA ACCESS; DOMAIN ISOLATION; ENTERPRISE; FILE SYSTEMS; INTER-DOMAIN; INTERNET ACCESS; INTERPROCESS COMMUNICATION; KERNEL LAYER; LIFE-TIMES; MANDATORY ACCESS CONTROL; MIDDLEWARE LAYER; NETWORK DATA; NETWORK TRAFFIC; SECURITY FRAMEWORKS; SOFTWARE STACKS; TRUST LEVEL; VIRTUALIZATIONS;

EID: 80755127062     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046614.2046624     Document Type: Conference Paper
Times cited : (127)

References (46)
  • 1
    • 80755182862 scopus 로고    scopus 로고
    • enterproid. http://www.enterproid.com/.
    • enterproid
  • 11
  • 18
    • 80755164279 scopus 로고    scopus 로고
    • Gartner Inc. http://www.gartner.com/it/page.jsp?id=1689814, 2011.
    • (2011)
  • 21
    • 84885884258 scopus 로고    scopus 로고
    • Google Inc.
    • Google Inc. Google Android. http://www.android.com/.
    • Google Android
  • 24
    • 79251558865 scopus 로고    scopus 로고
    • These aren't the permissions you're looking for
    • A. Lineberry, D. L. Richardson, and T. Wyatt. These aren't the permissions you're looking for. BlackHat USA 2010. http://dtors.files.wordpress. com/ 2010/08/blackhat-2010-slides.pdf, 2010.
    • (2010) BlackHat USA 2010
    • Lineberry, A.1    Richardson, D.L.2    Wyatt, T.3
  • 26
    • 33845953872 scopus 로고    scopus 로고
    • National Security Agency. Security-Enhanced Linux. http://www.nsa.gov/ research/selinux.
    • Security-Enhanced Linux
  • 27
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending Android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android permission model and enforcement with user-defined runtime constraints. In ACM ASIACCS, 2010.
    • (2010) ACM ASIACCS
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 28
    • 84860533481 scopus 로고    scopus 로고
    • Beyond kernel-level integrity measurement: Enabling remote attestation for the Android platform
    • M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert. Beyond kernel-level integrity measurement: Enabling remote attestation for the Android platform. In TRUST, 2010.
    • (2010) TRUST
    • Nauman, M.1    Khan, S.2    Zhang, X.3    Seifert, J.-P.4
  • 29
    • 80755124462 scopus 로고    scopus 로고
    • Building Android sandcastles in Android's sandbox
    • Nils
    • Nils. Building Android sandcastles in Android's sandbox. BlackHat Abu Dhabi 2010. https://media.blackhat.com/bh-ad-10/Nils/Black- Hat-AD-2010-android- sandcastle-wp.pdf, 2010.
    • (2010) BlackHat Abu Dhabi 2010
  • 30
    • 80755167439 scopus 로고    scopus 로고
    • Android Hax
    • J. Oberheide. Android Hax. SummerCon 2010. http://jon.oberheide.org/ files/summercon10-androidhax-jonoberheide.pdf, 2010.
    • (2010) SummerCon 2010
    • Oberheide, J.1
  • 31
    • 78751555807 scopus 로고    scopus 로고
    • Porscha: Policy oriented secure content handling in Android
    • M. Ongtang, K. Butler, and P. McDaniel. Porscha: Policy oriented secure content handling in Android. In ACSAC, 2010.
    • (2010) ACSAC
    • Ongtang, M.1    Butler, K.2    McDaniel, P.3
  • 32
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in Android
    • M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in Android. In ACSAC, 2009.
    • (2009) ACSAC
    • Ongtang, M.1    McLaughlin, S.2    Enck, W.3    McDaniel, P.4
  • 33
    • 80755167445 scopus 로고    scopus 로고
    • Open Kernel Labs. Ok:android. http://www.ok-labs.com/products/ok-android.
    • Ok:android
  • 34
    • 79251587269 scopus 로고    scopus 로고
    • Palm Source, Inc. Version 1
    • Palm Source, Inc. Open Binder. Version 1. http://www.angryredplanet.com/ ~hackbod/ openbinder/docs/html/index.html, 2005.
    • (2005) Open Binder
  • 41
    • 77954722817 scopus 로고    scopus 로고
    • M-Shield mobile security technology
    • J. Srage and J. Azema. M-Shield mobile security technology, 2005. TI White paper. http://focus.ti. com/pdfs/wtbu/ti-mshield-whitepaper.pdf.
    • (2005) TI White Paper
    • Srage, J.1    Azema, J.2
  • 42
    • 79959402881 scopus 로고    scopus 로고
    • Trusted Computing Group. Version 1.0 Revision 6, 26 June
    • Trusted Computing Group. Mobile Trusted Module Specification. Version 1.0 Revision 6, 26 June 2008.
    • (2008) Mobile Trusted Module Specification
  • 43
    • 77649301801 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). Version 1.4, Revision 4
    • Trusted Computing Group (TCG). TNC Architecture for Interoperability, Version 1.4, Revision 4, 2009.
    • (2009) TNC Architecture for Interoperability


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.