- 1、本文档共14页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
a permission verification approach for android mobile applications:安卓移动应用程序的权限验证方法
c o m p u t e r s s e c u r i t y 4 9 ( 2 0 1 5 ) 1 9 2 e2 0 5
Available online at
ScienceDirect
journal homepage: /locate/cose
A Permission verification approach for
android mobile applications
Dimitris Geneiatakis a, *, Igor Nai Fovino a, Ioannis Kounelis a,b,
Paquale Stirparo a,b
a Institute for the Protection and Security of the Citizen, Joint Research Centre (JRC), European Commission,
Ispra, VA, Italy
b Royal Institute of Technology (KTH), Stockholm, Sweden
a r t i c l e i n f o a b s t r a c t
Article history: Mobile applications build part of their security and privacy on a declarative permission
Received 2 January 2014 model. In this approach mobile applications, to get access to sensitive resources, have to
Received in revised form define the corresponding permissions in a manifest. However, mobile applications may
6 October 2014 request access to permissions that they do not require for their execution (over-privileges)
Accepted 14 October 2014 and offer opportunities to malicious software to gain access to otherwise inaccessible re-
Available online 7 November 2014 sources. In this paper, we investigate on the declarative permissions model on which se-
curity and privacy services of Android rely upon. We propose a practical and efficient
Keywords: permission certification technique, in the direction of risk management assessment. We
Android combine b
您可能关注的文档
- a novel algorithm for colour image steganography using a new intelligent technique based on three phases:一种新的基于三个相位的彩色图像隐写算法.pdf
- a novel algorithm of extended neural networks for image recognition:一种新的扩展神经网络图像识别算法.pdf
- a novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks:一种新型的和可证明安全的生物识别技术为基础的三因素的远程身份认证方案的移动客户端–服务器网络.pdf
- a novel ant colony optimization based scheme for substitution box design:一种基于蚁群优化的置换盒设计方案.pdf
- a novel apoa-i truncation (apoa-imytilene) associated with decreased apoa-i production:一种新型apoa-1截断(apoa imytilene)减少apoa-i生产相关.pdf
- a novel approach based on dematel method and patent citation analysis for prioritizing a portfolio of investment projects:基于dematel方法和专利引文分析的优先投资项目组合的新方法.pdf
- a novel antibody targeting cd24 and hepatocellular carcinoma in vivo by near-infrared fluorescence imaging:一种新型抗体靶向cd24和肝细胞癌的实验研究利用近红外荧光成像.pdf
- a novel approach for fuzzy logic pv inverter controller optimization using lightning search algorithm:一种基于模糊逻辑的光伏逆变器控制器优化设计方法.pdf
- a novel approach for monitoring writing interferences during navigated transcranial magnetic stimulation mappings of writing related cortical areas:写作过程中监测干扰导航经颅磁刺激映象写作相关的皮层区域的一种新方法.pdf
- a novel approach of bulk data hiding using text steganography:一种新颖的基于文本隐写的数据隐藏方法.pdf
文档评论(0)