We show that the way in which permissionbased mechanisms are used on today’s mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly execute operations that those applications, based on their declared permissions, should not be able to execute. Example operations include disclosure of users private data (e.g., phone book and calendar entries) to remote parties by applications that do not have direct access to such data or cannot directly establish remote connections. We further show that on today’s mobile platforms users are not made aware of possible implications of application collusion– quite the contrary–users are implicitly ...
Mobile security becomes an important issues when mobiles devices and services gets popular over the ...
The emergence of Android as a leading Operating System in terms of market coverage induced the rapid...
Mobile operating systems (i.e., mobile platforms) favor flexibility and re-usability as design princ...
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user infor...
Modern smartphones that implement permission-based se-curity mechanisms suffer from attacks by collu...
© 2016 Copyright held by the owner/author(s).Portable smart devices potentially store a wealth of in...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Android's security framework has been an appealing subject of research in the last few years. Androi...
Mobile devices pose a particular security risk because they hold personal details (accounts, locatio...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...
Android’s security framework has been an appealing sub-ject of research in the last few years. Andro...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
Mobile security becomes an important issues when mobiles devices and services gets popular over the ...
The emergence of Android as a leading Operating System in terms of market coverage induced the rapid...
Mobile operating systems (i.e., mobile platforms) favor flexibility and re-usability as design princ...
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user infor...
Modern smartphones that implement permission-based se-curity mechanisms suffer from attacks by collu...
© 2016 Copyright held by the owner/author(s).Portable smart devices potentially store a wealth of in...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Android's security framework has been an appealing subject of research in the last few years. Androi...
Mobile devices pose a particular security risk because they hold personal details (accounts, locatio...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...
Android’s security framework has been an appealing sub-ject of research in the last few years. Andro...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
Mobile security becomes an important issues when mobiles devices and services gets popular over the ...
The emergence of Android as a leading Operating System in terms of market coverage induced the rapid...
Mobile operating systems (i.e., mobile platforms) favor flexibility and re-usability as design princ...