Attacking Android smartphone systems without permissions

Android requires third-party applications to request for permissions when they access critical mobile resources, such as users' personal information and system operations. In this paper, we present the attacks that can be launched without permissions. We first perform call graph analysis, compo...

Full description

Saved in:
Bibliographic Details
Main Authors: SU, Mon Kywe, LI, Yingjiu, PETAL, Kunal, GRACE, Michael
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3768
https://ink.library.smu.edu.sg/context/sis_research/article/4770/viewcontent/PST_2016.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English

Similar Items