Mobile applications build part of their security and privacy on a declarative permission model. In this approach mobile applications, to get access to sensitive resources, have to define the corresponding permissions in a manifest. However, mobile applications may request access to permissions that they do not require for their execution (over-privileges) and offer opportunities to malicious software to gain access to otherwise inaccessible resources. In this paper, we investigate on the declarative permissions model on which security and privacy services of Android rely upon. We propose a practical and efficient permission certification technique, in the direction of risk management assessment. We combine both runtime information and stati...
A common security architecture, called the permission-based security model (used e.g. in Android and...
To protect user’s privacy and system’s integrity,\ud mobile platforms use permission models to contr...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
The emergence of Android as a leading Operating System in terms of market coverage induced the rapid...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...
Modern smartphone operating systems (OSs) have been developed with a greater em-phasis on security a...
In this work we present a comprehensive formal specification of an idealized formulation of Android?...
We propose a new attestation approach for the Android platform that integrates Trusted Computing con...
This article reports on our experiences in applying formal methods to verify the security mechanisms...
The Android OS market is experiencing a growing share globally. It is becoming the mobile platform o...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
A common security architecture, called the permission-based security model (used e.g. in Android and...
To protect user’s privacy and system’s integrity,\ud mobile platforms use permission models to contr...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
The emergence of Android as a leading Operating System in terms of market coverage induced the rapid...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...
Modern smartphone operating systems (OSs) have been developed with a greater em-phasis on security a...
In this work we present a comprehensive formal specification of an idealized formulation of Android?...
We propose a new attestation approach for the Android platform that integrates Trusted Computing con...
This article reports on our experiences in applying formal methods to verify the security mechanisms...
The Android OS market is experiencing a growing share globally. It is becoming the mobile platform o...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
Android based devices are becoming widespread. As a result and since those devices contain personal ...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...
A common security architecture, called the permission-based security model (used e.g. in Android and...
To protect user’s privacy and system’s integrity,\ud mobile platforms use permission models to contr...
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from b...