Copyright © 2014 Ahmed Al-Haiqi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system.Aside from all sorts ofmalware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications commun...
Technological advances in the smartphone industry have revolutionized how we live everyday life. It ...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Modern smartphones that implement permission-based se-curity mechanisms suffer from attacks by collu...
Network covert channels are used to exfiltrate information from a secured environment in such a way ...
Network covert channels are used to exfiltrate information from a secured environment in a way t...
In “Exploring a High-Capacity Covert Channel for the Android Operating System” [1], a covert channel...
Malicious software (malware) is designed to circumvent the security policy of the host device. Smart...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
Nowadays smartphones are playing active roles in people’s life. A smartphone is no longer a simple c...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Portable devices, su...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
Privacy has been a concern that’s been associated with communications since the invention of the tel...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Technological advances in the smartphone industry have revolutionized how we live everyday life. It ...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Modern smartphones that implement permission-based se-curity mechanisms suffer from attacks by collu...
Network covert channels are used to exfiltrate information from a secured environment in such a way ...
Network covert channels are used to exfiltrate information from a secured environment in a way t...
In “Exploring a High-Capacity Covert Channel for the Android Operating System” [1], a covert channel...
Malicious software (malware) is designed to circumvent the security policy of the host device. Smart...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
Nowadays smartphones are playing active roles in people’s life. A smartphone is no longer a simple c...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Portable devices, su...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
Privacy has been a concern that’s been associated with communications since the invention of the tel...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Technological advances in the smartphone industry have revolutionized how we live everyday life. It ...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...