Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?

作者: Xuetao Wei , Lorenzo Gomez , Iulian Neamtiu , Michalis Faloutsos

DOI: 10.1109/ICDEW.2012.81

关键词:

摘要: Android applications are used in a variety of domains, including business, social, media, health, scientific, and even military. On one hand, enterprises can take advantage the richness to support their business needs. other devices contain rich sensitive data -- e.g., GPS location, photos, calendar, contacts, email, files which is critical enterprise unauthorized access this lead serious security risks. In paper, we describe nature sources data, what malicious do possible solutions secure mitigate The purpose paper raise employees' enterprises' awareness show that suite easy-to-implement measures improve both employee security.

参考文章(4)
William Enck, Defending users against smartphone apps: techniques and future directions international conference on information systems security. pp. 49- 70 ,(2011) , 10.1007/978-3-642-25560-1_3
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, David Wagner, A survey of mobile malware in the wild Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 3- 14 ,(2011) , 10.1145/2046614.2046618