SCRUTINIZING PERMISSION BASED ATTACK ON ANDROID OS PLATFORM DEVICES
Abstract
Keywords
Full Text:
PDFReferences
Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon, “Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android”, in IEEE/ACM International Conference on Automated Software Engineering (ASE), Essen, Germany, 2012.
Khodor Hamandi, et.al “Android SMS Malware: Vulnerability and Mitigation” 2013 27th International Conference on Advanced Information Networking and Applications Workshops 2013.
Lucas Davi, et .al “Privilege escalation attacks on android” In Proceedings of the 13th International Conference on Information Security, Boca Raton, FL, USA ,October 25 - 28, 2010.
Yuan Zhang, et .al “Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis”, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany, November 04 - 08, 2013
Zarni Aung and Win Zaw, “Permission-Based Android Malware Detection” international journal of scientific & technology research volume 2, issue 3, march 2013 issn 2277-8616, 2013.
David Barrera et .al “A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android”, Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
Zheran Fang, Weili Han and Yingjiu Li, “Permission based Android security: Issues and countermeasures” computers & security 43 (2014) 205-218.
Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto and Toshiaki Tabaka, “A Small but Non-negligible Flaw in the Android Permission Scheme” 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010.
I. Rassameeroj and Y. Tanahashi, "Various approaches in analyzing Android applications with its permission-based security models," 2011 IEEE International Conference on Electro/Information Technology, Mankato, MN, 2011, pp. 1-6.
Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou, “Analysis of Android Applications’ Permissions” 2012 IEEE Sixth International Conference on Software Security and Reliability Companion 2012.
Eric Cole et .al “Constructing Attack Scenarios for Attacker Profiling and Identification”, [Online]. Available: “http://www.securityhaven. com /docs/ Constructing Attack Scenarios for Attacker Profiling and Identificationv6. pdf, Jun 2010.
Android Developer (2017, April 10) [Online] Available: https:// developer. android. com/guide /index.html.
Android Market Share (2017, May 15) [Online] Available: https://qz.com /826672/android-goog-
just-hit-a-record-88-market-share-of-all-smartphones/.
Global Market Share of Smartphones (2017, April 05) [Online] Available: https://www. statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/.
DOI: https://doi.org/10.26483/ijarcs.v8i7.4212
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

