Proceedings of the 6th International Conference on Communication and Network Security 2016
DOI: 10.1145/3017971.3017973
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment

Abstract: In the universal Android system, each application runs in its own sandbox, and the permission mechanism is used to enforce access control to the system APIs and applications. However, permission leak could happen when an application without certain permission illegally gain access to protected resources through other privileged applications. In order to address permission leak in a trusted execution environment, this paper designs security architecture which contains sandbox module, middleware module, usage an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 21 publications
(21 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?