National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we noticed a lack in the capabilities of the Android permission model against a number of emerging threats. To address these threats, we propose a security policy that complements the current Android permission system. This policy aims at restricting dynamically, i.e. based on the current smartphone execution context, the execution rights and the ability to access smartphone resources for each installed application. Besides the security benefits, the use of such a policy allows a user to have a tighter control over the access ofapplications to privacy-related data. This security policy is the first contribution of this thesis. Furthermore, we designed...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we notice...
National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we notice...
Dans cette thèse, nous nous intéressons spécifiquement à l'environnement Android. Nous avons en effe...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
The Android Security Framework controls the executions of applications through permissions which are...
Android’s security model utilizes a combination of low-level and high-level security mechanisms, suc...
With the expansion of the market share occupied by the Android platform, security issues (especially...
Android is widely used for the development and deployment of autonomous and smart systems, including...
The widespread adoption of the Android operating system in a variety type of devices ranging from sm...
Android has become the most popular operating system for mobile devices, which makes it a prominent ...
The pervasiveness of Android devices in today’s interconnected world emphasizes the importance of mo...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we notice...
National audienceIn this thesis, we specifically focus on the Android environment. Indeed, we notice...
Dans cette thèse, nous nous intéressons spécifiquement à l'environnement Android. Nous avons en effe...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
The Android Security Framework controls the executions of applications through permissions which are...
Android’s security model utilizes a combination of low-level and high-level security mechanisms, suc...
With the expansion of the market share occupied by the Android platform, security issues (especially...
Android is widely used for the development and deployment of autonomous and smart systems, including...
The widespread adoption of the Android operating system in a variety type of devices ranging from sm...
Android has become the most popular operating system for mobile devices, which makes it a prominent ...
The pervasiveness of Android devices in today’s interconnected world emphasizes the importance of mo...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...