Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification

The ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restricti...

Full description

Bibliographic Details
Main Authors: Bagheri, Hamid, Kang, Eunsuk, Jackson, Daniel N., Malek, Sam
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: Springer Nature America, Inc 2019
Online Access:https://hdl.handle.net/1721.1/121239