Nativeguard: Protecting android applications from third-party native libraries

M Sun, G Tan - Proceedings of the 2014 ACM conference on Security …, 2014 - dl.acm.org
Android applications often include third-party libraries written in native code. However,
current native components are not well managed by Android's security architecture. We …

Aframe: Isolating advertisements from mobile applications in android

X Zhang, A Ahlawat, W Du - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
Android uses a permission-based security model to restrict applications from accessing
private data and privileged resources. However, the permissions are assigned at the …

The art of app compartmentalization: Compiler-based library privilege separation on stock android

J Huang, O Schranz, S Bugiel, M Backes - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Third-party libraries are commonly used by app developers for alleviating the development
efforts and for monetizing their apps. On Android, the host app and its third-party libraries …

Android permissions demystified

AP Felt, E Chin, S Hanna, D Song… - Proceedings of the 18th …, 2011 - dl.acm.org
Android provides third-party applications with an extensive API that includes access to
phone hardware, settings, and user data. Access to privacy-and security-relevant parts of the …

{ASM}: a programmable interface for extending android security

S Heuser, A Nadkarni, W Enck… - 23rd USENIX Security …, 2014 - usenix.org
Android, iOS, and Windows 8 are changing the application architecture of consumer
operating systems. These new architectures required OS designers to rethink security and …

[图书][B] Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android

J Jeon, KK Micinski, JA Vaughan, N Reddy, Y Zhu… - 2012 - Citeseer
Google's Android platform includes a permission model that protects access to sensitive
capabilities, such as Internet access, GPS use, and telephony. We have found that Android's …

A stitch in time: Supporting android developers in writingsecure code

DC Nguyen, D Wermke, Y Acar, M Backes… - Proceedings of the …, 2017 - dl.acm.org
Despite security advice in the official documentation and an extensive body of security
research about vulnerabilities and exploits, many developers still fail to write secure Android …

{AdSplit}: Separating smartphone advertising from applications

S Shekhar, M Dietz, DS Wallach - 21st USENIX Security Symposium …, 2012 - usenix.org
A wide variety of smartphone applications today rely on third-party advertising services,
which provide libraries that are linked into the hosting application. This situation is …

Appguard-real-time policy enforcement for third-party applications

M Backes, S Gerling, C Hammer, M Maffei… - 2012 - publikationen.sulb.uni-saarland.de
Android has become the most popular operating system for mobile devices, which makes it
a prominent target for malicious software. The security concept of Android is based on app …

Apex: extending android permission model and enforcement with user-defined runtime constraints

M Nauman, S Khan, X Zhang - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …