메뉴 건너뛰기




Volumn , Issue , 2012, Pages 51-60

Analysis of the communication between colluding applications on modern Smartphones

Author keywords

[No Author keywords available]

Indexed keywords

COVERT CHANNELS; INFORMATION FLOWS; MOBILE PLATFORM; PERMISSION-BASED SECURITY; RESEARCH COMMUNITIES; RESEARCH TOOLS; SAMSUNG; SENSITIVE INFORMATIONS;

EID: 84872117493     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2420950.2420958     Document Type: Conference Paper
Times cited : (135)

References (36)
  • 13
    • 84872106230 scopus 로고
    • A guide to understanding covert channel analysis of trusted systems, version 1 (light pink book)
    • November. National Computer Security Center, TCSEC Rainbow Series Library
    • V. Gligor. A guide to understanding covert channel analysis of trusted systems, version 1 (light pink book). NCSC-TG-030, Library No. S-240,572, November 1993. National Computer Security Center, TCSEC Rainbow Series Library.
    • (1993) NCSC-TG-030, Library No. S-240 , vol.572
    • Gligor, V.1
  • 14
    • 84872118765 scopus 로고    scopus 로고
    • Google. Android OS (up to version 2.3.7)
    • Google. Android OS (up to version 2.3.7). http://developer.android.com/.
  • 15
    • 84872112519 scopus 로고    scopus 로고
    • GRSecurity
    • GRSecurity. The GRSecurity project. http://grsecurity.net/features.php.
  • 16
    • 80455150777 scopus 로고    scopus 로고
    • Task oriented management obviates your onus on linux (TOMOYO Linux)
    • T. Harada, T. Horie, and K. Tanaka. Task oriented management obviates your onus on linux (TOMOYO Linux). Linux Conference, 2004.
    • (2004) Linux Conference
    • Harada, T.1    Horie, T.2    Tanaka, K.3
  • 18
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct.
    • B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, Oct. 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 21
    • 84872117439 scopus 로고    scopus 로고
    • accessed October 2012
    • Microsoft. Security for Windows Phone 7. http://msdn.microsoft.com/enus/ library/ff402533%28v=VS.92%29.aspx (accessed October 2012).
    • Security for Windows Phone 7
  • 22
    • 39149090024 scopus 로고    scopus 로고
    • A virtual machine based information flow control system for policy enforcement
    • DOI 10.1016/j.entcs.2007.10.010, PII S1571066108000455
    • S. K. Nair, P. N. D. Simpson, B. Crispo, and A. S. Tanenbaum. A virtual machine based information flow control system for policy enforcement. Electron. Notes Theor. Comput. Sci., 197(1):3-16, Feb. 2008. (Pubitemid 351253789)
    • (2008) Electronic Notes in Theoretical Computer Science , vol.197 , Issue.1 , pp. 3-16
    • Nair, S.K.1    Simpson, P.N.D.2    Crispo, B.3    Tanenbaum, A.S.4
  • 23
    • 84872120166 scopus 로고    scopus 로고
    • Nokia. Symbian OS. http://symbian.nokia.com.
  • 24
    • 84872109592 scopus 로고    scopus 로고
    • June (accessed October 2012)
    • J. Oberheide. Android Hax. SummerCon 2010, June 2010. http://jon.oberheide.org/files/summercon10- androidhax-jonoberheide.pdf (accessed October 2012).
    • (2010) Android Hax. SummerCon 2010
  • 32
    • 84872112209 scopus 로고    scopus 로고
    • accessed October 2012
    • The Lookout Blog. Lookout's privacy advisor protects your private information. http://blog.mylookout.com/2010/11/lookout%E2%80%99s-privacy- advisorprotects-your-private-information/ (accessed October 2012).
    • Lookout's Privacy Advisor Protects Your Private Information
  • 35
    • 78650733675 scopus 로고    scopus 로고
    • Threat analysis of the Android market
    • June. Smobile systems technical report, accessed October 2012
    • T. Vennon and D. Stroop. Threat analysis of the Android market. Technical report, GTC, June 2010. Smobile systems technical report, Available at http://threatcenter.smobilesystems.com/wpcontent/uploads/2010/06/ Android-Market-Threat-Analysis-6-22-10-v1.pdf (accessed October 2012).
    • (2010) Technical Report, GTC
    • Vennon, T.1    Stroop, D.2
  • 36
    • 34547331261 scopus 로고    scopus 로고
    • Covert and side channels due to processor architecture
    • DOI 10.1109/ACSAC.2006.20, 4041191, Proceedings - Annual Computer Security Applications Conference, ACSAC
    • Z. Wang and R. B. Lee. Covert and side channels due to processor architecture. In Proceedings of the 22nd Annual Computer Security Applications Conference, ACSAC '06, pages 473 -482, dec. 2006. (Pubitemid 351232939)
    • (2006) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 473-482
    • Wang, Z.1    Lee, R.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.