Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2420958
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the communication between colluding applications on modern smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
85
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 125 publications
(86 citation statements)
references
References 19 publications
0
85
1
Order By: Relevance
“…[27] describes a collusion scenario where a ContactManager and PasswordManager app use overt and covert channels to extract information through another app that acts like a generic weather app. In [28], the authors enumerate and evaluate the bandwidth of different overt and covert channels in real devices. Covert channels tested include: intent type enumeration, settings modification, thread and socket enumeration and free disk space among others, which were used also in [22].…”
Section: Related Workmentioning
confidence: 99%
“…[27] describes a collusion scenario where a ContactManager and PasswordManager app use overt and covert channels to extract information through another app that acts like a generic weather app. In [28], the authors enumerate and evaluate the bandwidth of different overt and covert channels in real devices. Covert channels tested include: intent type enumeration, settings modification, thread and socket enumeration and free disk space among others, which were used also in [22].…”
Section: Related Workmentioning
confidence: 99%
“…The notion of collusion has recently been discussed in many research papers. A practical demonstration of collusion attacks through covert channels can be found in [2,6]. Authors analyse free apps from the Android market and show that app collusion is a real threat.…”
Section: Related Workmentioning
confidence: 99%
“…XOR P 1 with the key's first 32-bits, XOR P 2 with its second 32-bits, and so on upto P 14 . This process or cycle repeated until the entire P-array has been XOR-ed with key bits.…”
Section:  Generating Subkeysmentioning
confidence: 99%