2015 24th International Conference on Computer Communication and Networks (ICCCN) 2015
DOI: 10.1109/icccn.2015.7288451
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Sensitive Resource Access Monitoring for Android Systems

Abstract: Mobile devices, with an extensive array of capabilities and flexibility, are sometimes said to be an extension of the human body. Enhancing device capabilities and incorporating them into everyday life have always been a huge focus of the mobile industry. In the area of mobile data collection, existing works collect various types of user behavior data via mobile device usage, and use the data to aid in further understanding of human behavior. Typical data collection utilizes application or background service i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Android utilizes the Linux security model and layers through a user-based permission system [42]. Apps can access resources through the permission system to gain access to resources such as the camera, GPS, Bluetooth, telephony functions, network connections, and other sensors [42]. Such permissions are granted to apps by users when they install an app.…”
Section: Android Operating Systemmentioning
confidence: 99%
“…Android utilizes the Linux security model and layers through a user-based permission system [42]. Apps can access resources through the permission system to gain access to resources such as the camera, GPS, Bluetooth, telephony functions, network connections, and other sensors [42]. Such permissions are granted to apps by users when they install an app.…”
Section: Android Operating Systemmentioning
confidence: 99%
“…We utilize a collection methodology [4] whereby typical data collection utilizes application or background service installed on the mobile device with user permission to collect data such as application IP flow call logs, location, Wi-Fi transmission, etc.…”
Section: Introductionmentioning
confidence: 99%