A Risk Assessment Method for Smartphones

作者: Marianthi Theoharidou , Alexios Mylonas , Dimitris Gritzalis

DOI: 10.1007/978-3-642-30436-1_36

关键词: PermissionRisk assessmentSingle entityUser inputComputer securityComputer scienceAndroid (operating system)

摘要: … This paper describes a method for risk assessment that is tailored for smartphones. The method does not treat this kind of device as a single entity. Instead, it identifies smartphone …

参考文章(17)
Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won, A Practical Analysis of Smartphone Security Lecture Notes in Computer Science. pp. 311- 320 ,(2011) , 10.1007/978-3-642-21793-7_35
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Simone Fischer-Hübner, Günther Pernul, Costas Lambrinoudakis, Trust, Privacy and Security in Digital Business ,(2008)
Thomas Lederm, Nathan L. Clarke, Risk assessment for mobile devices trust and privacy in digital business. pp. 210- 221 ,(2011) , 10.1007/978-3-642-22890-2_18
Shashi Shekhar, Michael Dietz, Anhei Shu, Dan S. Wallach, Yuliy Pisetsky, Quire: lightweight provenance for smart phone operating systems usenix security symposium. pp. 23- 23 ,(2011)
Stelios Dritsas, Dimitris Gritzalis, Alexios Mylonas, Bill Tsoumas, Smartphone security evaluation The malware attack case international conference on security and cryptography. pp. 25- 36 ,(2011)
M.T. Dlamini, J.H.P. Eloff, M.M. Eloff, Information security: The moving target Computers & Security. ,vol. 28, pp. 189- 198 ,(2009) , 10.1016/J.COSE.2008.11.007
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: A Comprehensive Security Assessment ieee symposium on security and privacy. ,vol. 8, pp. 35- 44 ,(2010) , 10.1109/MSP.2010.2