Secure Storage on Android with Context-Aware Access Control

作者: Faysal Boukayoua , Jorn Lapon , Bart De Decker , Vincent Naessens

DOI: 10.1007/978-3-662-44885-4_4

关键词:

摘要: Android devices are increasingly used in corporate settings. Although openness and cost-effectiveness key factors to opt for the platform, its level of data protection is often inadequate use. This paper presents a strategy secure credential storage Android. It supplemented by context-aware mechanism that restricts availability according predefined policies. Our approach protects stored better than iOS case device theft. Contrary other Android-based solutions, we do not depend on brand, hardware specs, price range or platform version. No modifications operating system required. The proposed concepts validated contextaware file management prototype.

参考文章(17)
Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders, Matthew Smith, Hey, You, Get Off of My Clipboard financial cryptography. pp. 144- 161 ,(2013) , 10.1007/978-3-642-39884-1_12
Krste Asanović, Mohit Tiwari, Dawn Song, Elaine Shi, Prashanth Mohan, Hilfi Alkaff, Andrew Osheroff, Eric Love, Context-centric security usenix conference on hot topics in security. pp. 9- 9 ,(2012)
Peter Teufl, Thomas Zefferer, Christof Stromberger, Mobile Device Encryption Systems Security and Privacy Protection in Information Processing Systems. pp. 203- 216 ,(2013) , 10.1007/978-3-642-39218-4_16
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically rich application-centric security in Android Security and Communication Networks. ,vol. 5, pp. 658- 673 ,(2012) , 10.1002/SEC.360
Joseph Bonneau, Mike Just, Greg Matthews, What's in a name? Evaluating statistical attacks on personal knowledge questions financial cryptography. pp. 98- 113 ,(2010) , 10.1007/978-3-642-14577-3_10
Denis Feth, Christian Jung, Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments Security and Privacy in Mobile Information and Communication Systems. pp. 69- 80 ,(2012) , 10.1007/978-3-642-33392-7_9
Dimitrios Lymberopoulos, Karin Strauss, Chuan Qin, Oriana Riva, Progressive authentication: deciding when to authenticate on mobile phones usenix security symposium. pp. 15- 15 ,(2012)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos, Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? international conference on data engineering. pp. 251- 254 ,(2012) , 10.1109/ICDEW.2012.81
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018