Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restricti...
Main Authors: | Bagheri, Hamid, Kang, Eunsuk, Jackson, Daniel N., Malek, Sam |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | English |
Published: |
Springer Nature America, Inc
2019
|
Online Access: | https://hdl.handle.net/1721.1/121239 |
Similar Items
-
A formal approach for detection of security flaws in the android permission system
by: Bagheri, Hamid, et al.
Published: (2018) -
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019) -
Android malware detection using permission based static analysis
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023) -
Android malware detection using permission based static analysis
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2024) -
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)