Proceedings of the 30th Annual ACM Symposium on Applied Computing 2015
DOI: 10.1145/2695664.2695679
|View full text |Cite
|
Sign up to set email alerts
|

A security configuration assessment for android devices

Abstract: The wide spreading of mobile devices, such as smartphones and tablets, and their always-advancing capabilities makes them an attractive target for attackers. This, together with the fact that users frequently store critical personal information in such devices and that many organizations currently allow employees to use their personal devices to access the enterprise information infrastructure and applications, makes the assessment of the security of mobile devices a key issue. This paper proposes an approach … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 8 publications
0
1
0
Order By: Relevance
“…The User-defined Security Configuration Assessment tool (uSEA) focuses on identifying Android device misconfigurations based on the CIS recommendations. 8 The uSEA tool can automatically extract the value for the 41 security configurations and store them in a cloud database, providing relevant recommendations for improving each device's configuration and data for performing deeper analyses of the most common Android misconfigurations.…”
Section: › Do Not Root (Jailbreak) the Devicementioning
confidence: 99%
“…The User-defined Security Configuration Assessment tool (uSEA) focuses on identifying Android device misconfigurations based on the CIS recommendations. 8 The uSEA tool can automatically extract the value for the 41 security configurations and store them in a cloud database, providing relevant recommendations for improving each device's configuration and data for performing deeper analyses of the most common Android misconfigurations.…”
Section: › Do Not Root (Jailbreak) the Devicementioning
confidence: 99%
“…The identification of a list of best configuration practices that can be used to enhance the security of Android devices (see Chapter 3), this list was gathered from the literature and can be used to evaluate device's security level. A great part of these configurations was extracted from the CIS [27] security benchmarks and from [10,13,51] (published on [95]);…”
Section: Main Contributions Of the Workmentioning
confidence: 99%
“…The tool supports the active search for configuration issues that may lead to security vulnerabilities in the devices under testing, providing information that can be used for improving the security of the assessed targets and for assessing the proneness of those targets to security attacks. The tool is currently available on Google Play [94]) and was initially introduced in [95].…”
Section: The Usea Toolmentioning
confidence: 99%
See 2 more Smart Citations