Attacking Android smartphone systems without permissions
Android requires third-party applications to request for permissions when they access critical mobile resources, such as users' personal information and system operations. In this paper, we present the attacks that can be launched without permissions. We first perform call graph analysis, compo...
Saved in:
Main Authors: | SU, Mon Kywe, LI, Yingjiu, PETAL, Kunal, GRACE, Michael |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3768 https://ink.library.smu.edu.sg/context/sis_research/article/4770/viewcontent/PST_2016.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A smartphone app to improve medication adherence in patients with type 2 diabetes in Asia : feasibility randomized controlled trial
by: Huang, Zhilian, et al.
Published: (2020) -
MtdScout : Complementing the identification of insecure methods in Android apps via source-to-bytecode signature generation and tree-based layered search
by: ZHANG, Zicheng, et al.
Published: (2024) -
AnFlo: Detecting anomalous sensitive information flows in Android apps
by: DEMISSIE, Biniam Fisseha, et al.
Published: (2018) -
Design and implementation of a smartphone-based oximeter in the android platform
by: Hernandez, James Rafael G., et al.
Published: (2013) -
A secure, usable, and transparent middleware for permission managers on Android
by: WANG, Daibin, et al.
Published: (2017)