2005
DOI: 10.2307/3491459
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Although the performance of iptables is known to degrade as the number of rules increases, studies have shown that it is able to simultaneously support hundreds of apps [23], which is more than enough for most Android users. In addition, when adopting alternatives to iptables such as nf-HiPAC [24] or IP Sets [25], our design is able to mediate thousands of apps simultaneously. Note that this protection mechanism addresses not only the security risks in the screenshot apps, but also those that come with sync and backup, USB tethering apps and any other apps built upon the ADB workaround or insecure use of the local socket channel.…”
Section: Mitigation and Suggestionsmentioning
confidence: 99%
“…Although the performance of iptables is known to degrade as the number of rules increases, studies have shown that it is able to simultaneously support hundreds of apps [23], which is more than enough for most Android users. In addition, when adopting alternatives to iptables such as nf-HiPAC [24] or IP Sets [25], our design is able to mediate thousands of apps simultaneously. Note that this protection mechanism addresses not only the security risks in the screenshot apps, but also those that come with sync and backup, USB tethering apps and any other apps built upon the ADB workaround or insecure use of the local socket channel.…”
Section: Mitigation and Suggestionsmentioning
confidence: 99%