scholarly journals Modeling and Enhancing Android’s Permission System

Author(s):  
Elli Fragkaki ◽  
Lujo Bauer ◽  
Limin Jia ◽  
David Swasey
Keyword(s):  
2010 ◽  
Vol 45.3 (0) ◽  
pp. 337-342
Author(s):  
Tetsunobu Yoshitake ◽  
Kouta Yoshimoto ◽  
Chikashi Deguchi
Keyword(s):  

2019 ◽  
Vol 54 (3) ◽  
pp. 907-914
Author(s):  
Toshiya Matsukawa ◽  
Bumpei Nakade ◽  
Shu Higuchi

2016 ◽  
Vol 51 (3) ◽  
pp. 292-298
Author(s):  
Takuya Nishimura ◽  
Toshiya Matsukawa ◽  
Bumpei Nakade ◽  
Shu Higuchi

2019 ◽  
Vol 63 (4) ◽  
pp. 593-603
Author(s):  
Latifa Er-rajy ◽  
My Ahmed El Kiram ◽  
Mohamed El Ghazouani

Abstract Nowadays, mobile applications are the devices’ core, so their security is essential for the platform on which are installed. Therefore, to make this security strong, Android implements permission system and sandboxing mechanism to reduce the attacks contingency. Also, antivirus software is used to detect the already known malware based on their signature, but unfortunately, this kind of program cannot detect cloned or repackaged malware. Thus, using authorizations to estimate the security vulnerability will surely be very useful for avoiding applications that are more susceptible to be dangerous according to the risk values obtained. Consequently, this will provide systematic support that will make it easier for users to make appropriate decisions and therefore greatly improve the Android devices’ security. In this article, additionally to the risk measures that have been already proposed in previous studies based on functionalities such as permissions and function calls, we add a set of mathematical metrics describing the case of susceptible and innocent applications already known. Our risk assessment exploits applications already known as malware and safe samples without any threat.


2013 ◽  
Vol 4 (1) ◽  
pp. 16-27 ◽  
Author(s):  
Kyoung Soo Han ◽  
Yeoreum Lee ◽  
Biao Jiang ◽  
Eul Gyu Im

Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Android from its competitors. However, IAC also facilitates malicious applications that can collude in attacks of privilege escalation. In this paper, the authors demonstrate with case studies that all IAC channels can potentially be utilized for privilege escalation attacks, and the authors propose a refinement to solve this problem by enforcing IAC permissions and exposing IAC to users.


2010 ◽  
Vol 45 (0) ◽  
pp. 57-57
Author(s):  
Tetsunobu Yoshitake ◽  
Kouta Yoshimoto ◽  
Chikashi Deguchi
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document