SplitSecond: Flexible privilege separation of Android apps
Android applications have been attractive targets to attackers due to the large number of users and the sensitive information they possess. After the success of the first step of an attack exploiting a software vulnerability, the consequential damage is primarily determined by the criticality and th...
Saved in:
Main Authors: | LEE, Jehyun, VENKATESWARA RAJA, Akshaya Venkateswara, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4686 https://ink.library.smu.edu.sg/context/sis_research/article/5689/viewcontent/SplitSecond_pst19_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
On return oriented programming threats in Android runtime
by: RAJA, Akshaya Venkateswara, et al.
Published: (2017) -
A quantitative evaluation of privilege separation in web browser designs
by: Dong, X., et al.
Published: (2014) -
A software environment for confining malicious android applications via resource virtualization
by: Li, X., et al.
Published: (2014) -
TOWARDS REDESIGNING WEB BROWSERS WITH SECURITY PRINCIPLES
by: DONG XINSHU
Published: (2013) -
Measuring the declared SDK versions and their consistency with API calls in android apps
by: WU, Daoyuan, et al.
Published: (2017)