National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we noticed a lack in the capabilities of the Android permission model against a number of emerging threats. To address these threats, we propose a security policy that complements the current Android permission system. This policy aims at restricting dynamically, i.e. based on the current smartphone execution context, the execution rights and the ability to access smartphone resources for each installed application. Besides the security benefits, the use of such a policy allows a user to have a tighter control over the access of applications to privacy-related data. This security policy is the first contribution of this thesis. Furthermore, we designe...
The pervasiveness of Android devices in today’s interconnected world emphasizes the importance of mo...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we notice...
Dans cette thèse, nous nous intéressons spécifiquement à l'environnement Android. Nous avons en effe...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
The Android Security Framework controls the executions of applications through permissions which are...
Android’s security model utilizes a combination of low-level and high-level security mechanisms, suc...
The widespread adoption of the Android operating system in a variety type of devices ranging from sm...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Android has become the most popular operating system for mobile devices, which makes it a prominent ...
With the expansion of the market share occupied by the Android platform, security issues (especially...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
The pervasiveness of Android devices in today’s interconnected world emphasizes the importance of mo...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we notice...
Dans cette thèse, nous nous intéressons spécifiquement à l'environnement Android. Nous avons en effe...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
The Android Security Framework controls the executions of applications through permissions which are...
Android’s security model utilizes a combination of low-level and high-level security mechanisms, suc...
The widespread adoption of the Android operating system in a variety type of devices ranging from sm...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Android has become the most popular operating system for mobile devices, which makes it a prominent ...
With the expansion of the market share occupied by the Android platform, security issues (especially...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
The pervasiveness of Android devices in today’s interconnected world emphasizes the importance of mo...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...