2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.39
|View full text |Cite
|
Sign up to set email alerts
|

Semantically Rich Application-Centric Security in Android

Abstract: Abstract-Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
199
1
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 283 publications
(201 citation statements)
references
References 8 publications
0
199
1
1
Order By: Relevance
“…A behavior-based malware detection system (pBMDS) is proposed in [31] that use correlation between user's inputs and system calls in order to detect anomalous activities related to SMS/MMS sending. A new service named Kirin security service for Android is described in [33] and [34] that perform lightweight certification of applications to mitigate malware at install time. This service uses security rules, which matches undesirable properties in security configuration, bundled with applications.…”
Section: Malware Detection In Smartphonementioning
confidence: 99%
“…A behavior-based malware detection system (pBMDS) is proposed in [31] that use correlation between user's inputs and system calls in order to detect anomalous activities related to SMS/MMS sending. A new service named Kirin security service for Android is described in [33] and [34] that perform lightweight certification of applications to mitigate malware at install time. This service uses security rules, which matches undesirable properties in security configuration, bundled with applications.…”
Section: Malware Detection In Smartphonementioning
confidence: 99%
“…Enck, Ongtang, Nauman and others [7][8][9] put forward an optimizing of an Android authorization mechanism. Wognsen et al [10] have conducted in-depth research and analysis on the Dalvik byte code.…”
Section: Related Workmentioning
confidence: 99%
“…Several work have been proposed to restrict the app's privilege. While Apex [45] allows users to selectively grant permissions to applications during the installation, Saint [46] goes further by governing runtime permission use as dictated by application provider policy. At the same time, several ideas have been proposed to defeat privilege-escalation attacks, including WoodPecker [40], PScount [26], DroidChecker [31], XMandDroid [28], Stowaway [38], and the work developed by Felt et al [39].…”
Section: Android System Securitymentioning
confidence: 99%