2011 International Conference on Internet Technology and Applications 2011
DOI: 10.1109/itap.2011.6006288
|View full text |Cite
|
Sign up to set email alerts
|

Extending Android Security Enforcement with a Security Distance Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Tang, Wei et al [35] proposed a Security Distance Model for mitigation of Android malware. Security Distance Model is based on the concept that not a single permission is enough for an application to threaten the security of Android devices.…”
Section: ) Permission Based Analysismentioning
confidence: 99%
“…Tang, Wei et al [35] proposed a Security Distance Model for mitigation of Android malware. Security Distance Model is based on the concept that not a single permission is enough for an application to threaten the security of Android devices.…”
Section: ) Permission Based Analysismentioning
confidence: 99%
“…The model is looking for differences between permissions and combination of permissions with a security problem. The higher the value of threat point indicated an application has a large security threat, otherwise declared as safe from malicious apps [9].…”
Section: Related Workmentioning
confidence: 99%
“…One of the most commonly used approaches is a security-based permission model. Tang et al [6] highlights that Android Security System and treatment are too weak and proposed ASESD to prevent malware. Ongtang et al [7] proposes the Saint framework, which grants permissions policies to overcome Android security weaknesses.…”
Section: Related Workmentioning
confidence: 99%
“…For example, if an application has the READ_PHONE_STATE and INTERNET permissions, that app can be used to get phone numbers, IMEI, user location etc. from the phone and can transmit the information to any Internet server [6]. Any application can also download and/or upload any kind of file in the background with appropriate permissions.…”
Section: A Android Osmentioning
confidence: 99%