2013
DOI: 10.1007/978-3-642-38592-6_20
|View full text |Cite
|
Sign up to set email alerts
|

Lintent: Towards Security Type-Checking of Android Applications

Abstract: The widespread adoption of Android devices has attracted the attention of a growing computer security audience. Fundamental weaknesses and subtle design flaws of the Android architecture have been identified, studied and fixed, mostly through techniques from data-flow analysis, runtime protection mechanisms, or changes to the operating system. This paper complements this research by developing a framework for the analysis of Android applications based on typing techniques. We introduce a formal calculus for re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 10 publications
0
23
0
Order By: Relevance
“…In such models, extra controls are implemented in order to prevent the called instance from being used as a deputy of an unprivileged component [22]. The issues just discussed were originally presented in [22,28,31] but referred to earlier versions of the Android platform and used different approaches to perform their analysis.…”
Section: Privilege Escalationmentioning
confidence: 99%
See 3 more Smart Citations
“…In such models, extra controls are implemented in order to prevent the called instance from being used as a deputy of an unprivileged component [22]. The issues just discussed were originally presented in [22,28,31] but referred to earlier versions of the Android platform and used different approaches to perform their analysis.…”
Section: Privilege Escalationmentioning
confidence: 99%
“…In such models, extra controls are implemented in order to prevent the called instance from being used as a deputy of an unprivileged component [22]. The issues just discussed were originally presented in [22,28,31] but referred to earlier versions of the Android platform and used different approaches to perform their analysis. Since our formalism fully captures both the interaction between components and the execution of API calls in the Android system we are convinced that the latest versions of the platform are still vulnerable to this kind of privilege escalation problems.…”
Section: Privilege Escalationmentioning
confidence: 99%
See 2 more Smart Citations
“…The modules of security architecture are implemented and deployed according to their responsibility. The usage and access module monitors the access to the FIGURE 7 Tiny4412 development board supporting ARM TrustZone that have been verified using the proof assistant of Coq., 44 Armando et al, 45 and Bugliesi et al 46 who presented a type and effect system in which they model basic Android's components and some operations.…”
Section: Experimental and Comparison Evaluationmentioning
confidence: 99%