Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?

作者: Yonglin Sun , Yongjun Wang , Xiaobin Wang

DOI: 10.1109/3PGCIC.2014.125

关键词:

摘要: Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile app's loyalty, or determine a given is not hypocritical thief? Thus, it very necessary to establish supervision mechanism restrict for privacy, but there isn't any technique supervise the behavior of till now. We summarized scenario android phone from five aspects, proposed Competitive Supervision Mechanism three theoretical supportive techniques concern.

参考文章(27)
Sahin Albayrak, Seyit A. Camtepe, Aubrey-Derrick Schmidt, Static smartphone malware detection School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty. ,(2010)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Sahin Albayrak, Seyit Camtepe, Jan Clausen, Aubrey-Derrick Schmidt, Kamer Ail Yuksel, Hans-Gunterh Schmidt, Kiraz Osman, Enhancing security of linux-based android devices School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty. ,(2008)
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Camtepe, Sahin Albayrak, Can Yildizli, Smartphone malware evolution revisited: Android next target? international conference on malicious and unwanted software. pp. 1- 7 ,(2009) , 10.1109/MALWARE.2009.5403026
Jeffrey Bickford, Ryan O'Hare, Arati Baliga, Vinod Ganapathy, Liviu Iftode, Rootkits on smart phones: attacks, implications and opportunities workshop on mobile computing systems and applications. pp. 49- 54 ,(2010) , 10.1145/1734583.1734596
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry, Practical and lightweight domain isolation on Android Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 51- 62 ,(2011) , 10.1145/2046614.2046624
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619