2013
DOI: 10.1007/978-3-642-36563-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Towards Unified Authorization for Android

Abstract: Abstract. Android applications that manage sensitive data such as email and files downloaded from cloud storage services need to protect their data from malware installed on the phone. While prior security analyses have focused on protecting system data such as GPS locations from malware, not much attention has been given to the protection of application data. We show that many popular commercial applications incorrectly use Android authorization mechanisms leading to attacks that steal sensitive data. We argu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Finally, an exhaustive formal comparison between both JME-MIDP and Android security models is proposed as further work. We have begun developing a formal specification of the Android security model in Coq, considering [82,87,88,89,90,91,92], which focuses on the analysis of the permission system in general, and in the scheme of permission re-delegation, in particular [93].…”
Section: Summary and Future Workmentioning
confidence: 99%
“…Finally, an exhaustive formal comparison between both JME-MIDP and Android security models is proposed as further work. We have begun developing a formal specification of the Android security model in Coq, considering [82,87,88,89,90,91,92], which focuses on the analysis of the permission system in general, and in the scheme of permission re-delegation, in particular [93].…”
Section: Summary and Future Workmentioning
confidence: 99%