2014 14th International Conference on Innovations for Community Services (I4CS) 2014
DOI: 10.1109/i4cs.2014.6860558
|View full text |Cite
|
Sign up to set email alerts
|

Curtailing privilege escalation attacks over asynchronous channels on Android

Abstract: Recently we presented QuantDroid [7], a quantitative approach towards mitigating privilege escalation attacks on Android. By monitoring all synchronous IPC via overt channels on-the-fly, a so called flow-graph service detects an abnormal amount of traffic exchanged between DVMs running different Apps to indicate a potential horizontal privilege escalation attack. However, although certainly a valuable first step, our initial QuantDroid approach fails when dealing with asynchronous IPC via persistent storage co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…A lot of research work has been carried out [8][9][10][11][12]. In the actual business production process of an enterprise, it is not only necessary to enhance the security development awareness and code specifications of code developers, but also necessary to have good security detection for the upcoming web applications.…”
Section: Introductionmentioning
confidence: 99%
“…A lot of research work has been carried out [8][9][10][11][12]. In the actual business production process of an enterprise, it is not only necessary to enhance the security development awareness and code specifications of code developers, but also necessary to have good security detection for the upcoming web applications.…”
Section: Introductionmentioning
confidence: 99%
“…It is also noteworthy that before now, most cyber-attacks were restricted to the IT infrastructure of critical organizations; however, with the convergence of OT and the IT infrastructure, there has been a significant shift in cyber-attacks to OT infrastructures [7] and these breaches often results in: reset of the phasor parameters, system shutdown, and disruption of the power grid system [6]. Usually, the Operating System (OS) provides the abstraction and support mechanism for the protection of hardware and application from misuse [8]; however, the cyber-attacks and threats especially, from non-state actors have assumed some level of sophistication in recent times. This therefore, makes the effective detection and prevention of cyber-attacks on the smart power grid system very important [9] [10].…”
Section: Introductionmentioning
confidence: 99%