Abstract. Android applications that manage sensitive data such as email and files downloaded from cloud storage services need to protect their data from malware installed on the phone. While prior security analyses have focused on protecting system data such as GPS locations from malware, not much attention has been given to the protection of ap-plication data. We show that many popular commercial applications in-correctly use Android authorization mechanisms leading to attacks that steal sensitive data. We argue that formal verification of application be-haviors can reveal such errors and we present a formal model in ProVerif that accounts for a variety of Android authorization mechanisms and system services. We write models for four popul...
Google Android is popular for mobile devices in recent years. The openness and popularity of Android...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...
International audienceAndroid applications that manage sensitive data such as email and files downlo...
The need of providing a secure environment to the users of technology is necessary to keep it going....
Abstract Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile a...
Abstract Android’s success makes it a prominent target for malicious software. However, the user has...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user infor...
Authentication is the most pervasive means for developers to protect users' private data against att...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Android is the most popular mobile operating system nowadays both for smartphones and tablets. This ...
AbstractAs increasing in number of Android phones there is simultaneous increase in mobile malware a...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
Google Android is popular for mobile devices in recent years. The openness and popularity of Android...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...
International audienceAndroid applications that manage sensitive data such as email and files downlo...
The need of providing a secure environment to the users of technology is necessary to keep it going....
Abstract Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile a...
Abstract Android’s success makes it a prominent target for malicious software. However, the user has...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user infor...
Authentication is the most pervasive means for developers to protect users' private data against att...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Android is the most popular mobile operating system nowadays both for smartphones and tablets. This ...
AbstractAs increasing in number of Android phones there is simultaneous increase in mobile malware a...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
Google Android is popular for mobile devices in recent years. The openness and popularity of Android...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...