2017
DOI: 10.4236/cn.2017.94016
|View full text |Cite
|
Sign up to set email alerts
|

Risks behind Device Information Permissions in Android OS

Abstract: In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…But for large data sets, underfitting can be avoided. There are many ways to combine features, but a common method of combining features is to use the feature values of the original features to multiply each other, and the product forms a combined feature (Alshehri et al, 2017). The original features are called first-order features, and the doubled first-order features are called second-order features, where X is a feature vector.…”
Section: Feature Combinationmentioning
confidence: 99%
“…But for large data sets, underfitting can be avoided. There are many ways to combine features, but a common method of combining features is to use the feature values of the original features to multiply each other, and the product forms a combined feature (Alshehri et al, 2017). The original features are called first-order features, and the doubled first-order features are called second-order features, where X is a feature vector.…”
Section: Feature Combinationmentioning
confidence: 99%
“…The basis of SEAndroid is the discretionary access control, and the added MAC is used to enhance the flexibility of the system. Apart from the above works on improving the permission mechanism of Android, there are various classic works to solve a specific security problem in Android, such as privilege escalation attacks, 21–24 man-in-the-middle attacks 23,25 and inter-process communication call vulnerabilities. 2628 To help inexperienced users manage permissions securely, some researchers proposed numerous permission management methods such as RecDroid 29 and the use of categories.…”
Section: Related Workmentioning
confidence: 99%