2010 IEEE Second International Conference on Social Computing 2010
DOI: 10.1109/socialcom.2010.140
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(29 citation statements)
references
References 4 publications
0
29
0
Order By: Relevance
“…While the fulfillment of the principle of least privilege when creating a new instance is widely studied in the literature [32,44], the analysis of this principle when accessing a content provider or delegating/revoking a permission has not been covered in other publications. Since our model includes these two scenarios, we are able to formally state and prove lemmas like the following:…”
Section: Privilegesmentioning
confidence: 99%
See 1 more Smart Citation
“…While the fulfillment of the principle of least privilege when creating a new instance is widely studied in the literature [32,44], the analysis of this principle when accessing a content provider or delegating/revoking a permission has not been covered in other publications. Since our model includes these two scenarios, we are able to formally state and prove lemmas like the following:…”
Section: Privilegesmentioning
confidence: 99%
“…Finally, Shin et al [44] adapt the approach followed by Zanella et al [17] to build a formal framework that represents the Android permission system, which is based on the Calculus of Inductive Constructions and it is developed in Coq, as we do. However, that formalization does not consider several aspects of the platform covered in our model, namely, the different types of components, the interaction between a running instance and the system, the reading/writing operation on a content provider and the semantics of the permission delegation mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Shin et al [25] developed a formal model in order to verify functional correctness properties of Android, which revealed a flaw in the naming scheme for permissions and a possible attack [26]. In contrast, our work develops a more abstract model suitable for reasoning about extensions to Android's permission system.…”
Section: Related Workmentioning
confidence: 99%
“…Shin et al [24] developed a formal model in order to verify functional correctness properties of Android, which revealed a flaw in the naming scheme for permissions and a possible attack [25]. In contrast, our work develops a more abstract model suitable for reasoning about extensions to Android's permission system.…”
Section: Related Workmentioning
confidence: 99%