Proceedings of the 30th Annual Computer Security Applications Conference 2014
DOI: 10.1145/2664243.2664265
|View full text |Cite
|
Sign up to set email alerts
|

Android security framework

Abstract: We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines them with the particular requirements and challenges from the design of Android's software stack. ASF provides a nov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…The analysis of behaviors is automatic, which means that the behavior of the stimulated app by user interaction is not considered as in MADAM. Android Security Framework (ASF) [34] is a generic and extensible security framework for Android that provides security API to facilitate the inclusion of security extensions in Android. This approach is orthogonal to MADAM: the goal of MADAM is to detect malware, i.e.…”
Section: Related Workmentioning
confidence: 99%
“…The analysis of behaviors is automatic, which means that the behavior of the stimulated app by user interaction is not considered as in MADAM. Android Security Framework (ASF) [34] is a generic and extensible security framework for Android that provides security API to facilitate the inclusion of security extensions in Android. This approach is orthogonal to MADAM: the goal of MADAM is to detect malware, i.e.…”
Section: Related Workmentioning
confidence: 99%
“…The researchers have proposed a wide spectrum of security models and extensions for permission mechanism. These extensions include context-related access control [7], developer-centric security policies [8], and dynamic, fine-grained permissions [9][10][11][12][13]. However, permission leak could happen when an application without certain permission illegally gain access to protected resources through other privileged applications [14].…”
Section: Introductionmentioning
confidence: 99%