2020
DOI: 10.1007/978-981-15-1675-7_2
|View full text |Cite
|
Sign up to set email alerts
|

The State of Android Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 8 publications
0
6
0
1
Order By: Relevance
“…There is a great wealth of studies which have analyzed the Android security mechanism based on permissions and other sets of features of the Android ecosystem that can compromise the security of the device or expose the user's privacy [53], [54].…”
Section: Aranac: Application Risk Assessment Based Network Access Controlmentioning
confidence: 99%
“…There is a great wealth of studies which have analyzed the Android security mechanism based on permissions and other sets of features of the Android ecosystem that can compromise the security of the device or expose the user's privacy [53], [54].…”
Section: Aranac: Application Risk Assessment Based Network Access Controlmentioning
confidence: 99%
“…As shown in Figure 1, each Android platform application is separated from the system and other apps since it runs on an isolated JVM. Upon executing the application, Android assigns each application a unique Linux User ID (UID) and a new ART/DVM virtual machine is forked [26].…”
Section: A Android Sandboxmentioning
confidence: 99%
“…This limitation is overcome in dynamic analysis [13], by scrutinizing data flows involved during runtime, which are helpful to identify malicious paths. Hybrid analysis [49,50] takes advantage of compromise between static and dynamic analysis and switch from one to another based on contexts. Unlike these works, we are about looking for reviews to evaluate and improve security-related health of apps on Google Play.…”
Section: Security Of Android Appsmentioning
confidence: 99%