Google Android: A Comprehensive Security Assessment

作者: A. Shabtai , Y. Fledel , U. Kanonov , Y. Elovici , S. Dolev

DOI: 10.1109/MSP.2010.2

关键词:

摘要: … and prioritize the threats to which an Android device might be exposed. We based our evaluation on assessing the impact and likelihood of various threats (see the sidebar on p. 43 …

参考文章(8)
David Emm, Mobile Malware: Mobile malware - new avenues Network Security archive. ,vol. 2006, pp. 4- 6 ,(2006) , 10.1016/S1353-4858(06)70450-0
Jerry Cheng, Starsky H.Y. Wong, Hao Yang, Songwu Lu, SmartSiren Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07. pp. 258- 271 ,(2007) , 10.1145/1247660.1247690
Asaf Shabtai, Yuval Fledel, Yuval Elovici, Securing Android-Powered Mobile Devices Using SELinux ieee symposium on security and privacy. ,vol. 8, pp. 36- 44 ,(2010) , 10.1109/MSP.2009.144
E. Eugene Schultz, Where have the worms and viruses gone?—new trends in malware Computer Fraud & Security. ,vol. 2006, pp. 4- 8 ,(2006) , 10.1016/S1361-3723(06)70398-0
Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger, Measuring integrity on mobile phone systems Proceedings of the 13th ACM symposium on Access control models and technologies - SACMAT '08. pp. 155- 164 ,(2008) , 10.1145/1377836.1377862
N. Leavitt, Mobile phones: the next frontier for hackers? IEEE Computer. ,vol. 38, pp. 20- 23 ,(2005) , 10.1109/MC.2005.134
William Enck, Machigar Ongtang, Patrick McDaniel, Understanding Android Security ieee symposium on security and privacy. ,vol. 7, pp. 50- 57 ,(2009) , 10.1109/MSP.2009.26
D. Dagon, T. Martin, T. Starner, Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing. ,vol. 3, pp. 11- 15 ,(2004) , 10.1109/MPRV.2004.21