Android’s success makes it a prominent target for malicious software. However, the user has very limited control over security-relevant operations. This work presents AppGuard, a powerful and flexible security system that overcomes these deficiencies. It enforces user-defined security policies on untrusted Android applications without requiring any changes to a smartphone’s firmware, root access, or the like. Fine-grained and stateful security policies are expressed in a formal specification language, which also supports secrecy requirements. Our system offers complete mediation of security-relevant methods based on calleesite inline reference monitoring and supports widespread deployment. In the experimental analysis we demonstrate the rem...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
The use of smartphones worldwide is growing very fast and also the malicious attacks have increased....
Android is widely used for the development and deployment of autonomous and smart systems, including...
Android’s success makes it a prominent target for malicious software. However, the user has very lim...
Abstract Android’s success makes it a prominent target for malicious software. However, the user has...
Android has become the most popular operating system for mobile devices, which makes it a prominent ...
The use of the Android operating system has become a very popular option with a vast variety of mobi...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
The Android Security Framework controls the executions of applications through permissions which are...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Abstract—Smartphones are nowadays used to store and pro-cess many kinds of privacy-sensitive data su...
Abstract Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile a...
International audienceAndroid applications that manage sensitive data such as email and files downlo...
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data such as cont...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
The use of smartphones worldwide is growing very fast and also the malicious attacks have increased....
Android is widely used for the development and deployment of autonomous and smart systems, including...
Android’s success makes it a prominent target for malicious software. However, the user has very lim...
Abstract Android’s success makes it a prominent target for malicious software. However, the user has...
Android has become the most popular operating system for mobile devices, which makes it a prominent ...
The use of the Android operating system has become a very popular option with a vast variety of mobi...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
The Android Security Framework controls the executions of applications through permissions which are...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Abstract—Smartphones are nowadays used to store and pro-cess many kinds of privacy-sensitive data su...
Abstract Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile a...
International audienceAndroid applications that manage sensitive data such as email and files downlo...
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data such as cont...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
The use of smartphones worldwide is growing very fast and also the malicious attacks have increased....
Android is widely used for the development and deployment of autonomous and smart systems, including...