Defending users against smartphone apps: techniques and future directions

作者: William Enck

DOI: 10.1007/978-3-642-25560-1_3

关键词:

摘要: Smartphone security research has become very popular in response to the rapid, worldwide adoption of new platforms such as Android and iOS. Smartphones are characterized by their ability run third-party applications, iOS take this concept extreme, offering hundreds thousands “apps” through application markets. In response, smartphone focused on protecting users from apps. paper, we discuss current state research, including efforts designing OS protection mechanisms, well performing analysis real We offer insight into what works, clear limitations, promising directions for future research.

参考文章(55)
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh, Taming information-stealing smartphone applications (on Android) trust and trustworthy computing. pp. 93- 107 ,(2011) , 10.1007/978-3-642-21599-5_7
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee, Using Labeling to Prevent Cross-Service Attacks Against Smart Phones Detection of Intrusions and Malware & Vulnerability Assessment. pp. 91- 108 ,(2006) , 10.1007/11790754_6
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert, Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform Trust and Trustworthy Computing. pp. 1- 15 ,(2010) , 10.1007/978-3-642-13869-0_1
Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo, CRePE: context-related policy enforcement for android international conference on information security. ,vol. 6531, pp. 331- 345 ,(2010) , 10.1007/978-3-642-18178-8_29
Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna, PiOS : Detecting privacy leaks in iOS applications network and distributed system security symposium. ,(2011)
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically rich application-centric security in Android Security and Communication Networks. ,vol. 5, pp. 658- 673 ,(2012) , 10.1002/SEC.360
Wenwu Zhu, Helen J. Wang, Chuanxiong Guo, Smart-Phone Attacks and Defenses ,(2004)
Shashi Shekhar, Michael Dietz, Anhei Shu, Dan S. Wallach, Yuliy Pisetsky, Quire: lightweight provenance for smart phone operating systems usenix security symposium. pp. 23- 23 ,(2011)