Proceedings of the 29th Annual Computer Security Applications Conference 2013
DOI: 10.1145/2523649.2523652
|View full text |Cite
|
Sign up to set email alerts
|

AFrame

Abstract: Android uses a permission-based security model to restrict applications from accessing private data and privileged resources. However, the permissions are assigned at the application level, so even untrusted third-party libraries, such as advertisement, once incorporated, can share the same privileges as the entire application, leading to over-privileged problems.We present AFrame, a developer friendly method to isolate untrusted third-party code from the host applications. The isolation achieved by AFrame cov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 55 publications
(2 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…It was implemented using the React JavaScript front-end software framework [30] for 2D user interface (2DUI) and the A-Frame framework [31] for 3D VLE with various learning activities. The Networked-AFrame [32], an extension of A-Frame, was used to allow 3D scene sharing by multiple users. A demo version of LIRKIS-SpecEdu-VRSchool is available at [33].…”
Section: Web-based Virtual Learning Environments Applicationmentioning
confidence: 99%
“…It was implemented using the React JavaScript front-end software framework [30] for 2D user interface (2DUI) and the A-Frame framework [31] for 3D VLE with various learning activities. The Networked-AFrame [32], an extension of A-Frame, was used to allow 3D scene sharing by multiple users. A demo version of LIRKIS-SpecEdu-VRSchool is available at [33].…”
Section: Web-based Virtual Learning Environments Applicationmentioning
confidence: 99%
“…However, we anticipate that integrating static analysis into LensCap would enhance its ability by further pre-screening any privacy threats possibly injected by malicious app developers at the split-process boundary. Isolation and compartmentalization Isolation and compartmentalization are adopted in both hardware and software domains to separate the execution of untrusted code from others[9,11,27,29,43,55,66]. Herbster et al proposed Privacy Capsules[23] which also targets on protecting the leakage of user information through untrusted third-party applications.…”
mentioning
confidence: 99%