메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 1-18

Modeling and enhancing Android's permission system

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACT MODELS; FORMAL FRAMEWORK; INTEGRITY POLICY; SECURITY ARCHITECTURE; SECURITY MECHANISM; SECURITY PROPERTIES; UNDESIRED BEHAVIOR;

EID: 84865576227     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_1     Document Type: Conference Paper
Times cited : (71)

References (27)
  • 1
    • 84863954784 scopus 로고    scopus 로고
    • Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
    • Armando, A., Merlo, A., Verderame, M.M.: Would you mind forking this process? A denial of service attack on Android (and some countermeasures). In: Proc. IFIP SEC (2012)
    • Proc. IFIP SEC (2012)
    • Armando, A.1    Merlo, A.2    Verderame, M.M.3
  • 6
    • 85037073388 scopus 로고    scopus 로고
    • Privilege Escalation Attacks on Android
    • Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
    • Davi, L., Dmitrienko, A., Sadeghi, A.R.,Winandy,M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6531 , pp. 346-360
    • Davi, L.1    Dmitrienko, A.2    Sadeghi, A.R.3    Winandy, M.4
  • 14
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications
    • Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications. In: Proc. CCS (2011)
    • Proc. CCS (2011)
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 20
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending Android permission model and enforcement with user-defined runtime constraints
    • Nauman, M., Khan, S., Zhang, X.: Apex: extending Android permission model and enforcement with user-defined runtime constraints. In: Proc. ASIACCS (2010)
    • Proc. ASIACCS (2010)
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 21
    • 84865599469 scopus 로고    scopus 로고
    • NTT Data Corporation: tomoyo.sourceforge.jp/ accessed April 10, 2012
    • NTT Data Corporation: TOMOYO Linux (2012), tomoyo.sourceforge.jp/ (accessed April 10, 2012)
    • (2012) TOMOYO Linux
  • 23
    • 84865599121 scopus 로고    scopus 로고
    • hackmageddon.com/2011/08/11/one-year-of-android-malware-full-list/ accessed June 20, 2012
    • Passeri, P.: One year of Android malware (full list) (2011), hackmageddon.com/2011/08/11/one-year-of-android-malware-full-list/ (accessed June 20, 2012)
    • (2011) One Year of Android Malware (Full List)
    • Passeri, P.1
  • 25
    • 78649293466 scopus 로고    scopus 로고
    • A formal model to analyze the permission authorization and enforcement in the Android framework
    • Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the Android framework. In: Proc. SocialCom/PASSAT (2010)
    • Proc. SocialCom/PASSAT (2010)
    • Shin, W.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4
  • 27
    • 85137132511 scopus 로고    scopus 로고
    • Detecting repackaged smartphone applications in third-party Android marketplaces
    • Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party Android marketplaces. In: Proc. CODASPY 2012 (2012)
    • (2012) Proc. CODASPY 2012
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.