Security analysis of permission re-delegation vulnerabilities in Android apps

BF Demissie, M Ceccato, LK Shar - Empirical Software Engineering, 2020 - Springer
The Android platform facilitates reuse of app functionalities by allowing an app to request an
action from another app through inter-process communication mechanism. This feature is …

An adaptive and configurable protection framework against android privilege escalation threats

Y Xu, G Wang, J Ren, Y Zhang - Future Generation Computer Systems, 2019 - Elsevier
Android is a successful mobile platform with a thriving application ecosystem. However,
despite its security precautions like permission mechanism, it is still vulnerable to privilege …

A security modeling and verification method of embedded software based on Z and MARTE

X Hu, Y Zhuang, F Zhang - Computers & Security, 2020 - Elsevier
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …

Security testing of second order permission re-delegation vulnerabilities in android apps

BF Demissie, M Ceccato - Proceedings of the IEEE/ACM 7th …, 2020 - dl.acm.org
In Android, inter-app communication is a cornerstone feature where apps exchange special
messages called Intents in order to integrate with each other and deliver a rich end-user …

[PDF][PDF] A novel android security framework to prevent privilege escalation attacks

AKH Hussain, M Kakavand, M Silval… - Int J Comput Netw Inf …, 2020 - academia.edu
Android is the most popular operating system in the world, with numerous applications
having been developed for the platform since its inception, however, it has its fair share of …

Container‐Based Privacy Preserving Scheme for Android Applications

H Cui, S Shao, S Niu, W Zhang… - Chinese Journal of …, 2020 - Wiley Online Library
An application layer privacy data protection scheme combining dynamic and static analysis
is proposed. Android component life cycle and system calls are first studied, and the taint …

[PDF][PDF] Privilege Leakage in Practical Systems.

MC Grace - 2017 - repository.lib.ncsu.edu
ABSTRACT GRACE, MICHAEL C. Privilege Leakage in Practical Systems.(Under the
direction of Xuxian Jiang and William Enck.) The modern world places great reliance on …