Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering 2012
DOI: 10.1145/2351676.2351722
|View full text |Cite
|
Sign up to set email alerts
|

Automatically securing permission-based software by reducing the attack surface: an application to Android

Abstract: Abstract-Android based devices are becoming widespread. As a result and since those devices contain personal and confidential data, the security model of the android software stack has been analyzed extensively. One key feature of the security model is that applications must declare a list of permissions they are using to access resources. Using static analysis, we first extracted a table from the Android API which maps methods to permissions. Then, we use this mapping within a tool we developed to check that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 111 publications
(68 citation statements)
references
References 25 publications
0
68
0
Order By: Relevance
“…Except privacy leaks detection, there has been a rich body of work on other Android security issues [9], [12], [18], [20], [23], [51] such as energy bugs [15], [32] and SSL vulnerabilities [19], [41]. Our work can complement their research by providing a highly precise control-flow graph to enable them to perform inter-component data-flow analysis and consequently to get better results.…”
Section: Related Workmentioning
confidence: 99%
“…Except privacy leaks detection, there has been a rich body of work on other Android security issues [9], [12], [18], [20], [23], [51] such as energy bugs [15], [32] and SSL vulnerabilities [19], [41]. Our work can complement their research by providing a highly precise control-flow graph to enable them to perform inter-component data-flow analysis and consequently to get better results.…”
Section: Related Workmentioning
confidence: 99%
“…Stowaway [23] and COPES [16] are designed to find those apps that request more permissions than they need. PScout [15] analyzes the usage trend of permissions in Android apps.…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…Clearly, users prefer applications with minimum set of permissions. This protection mechanism is often error-prone and in most of the cases developers end up using permissions they do not require in their code, or the opposite [4].…”
Section: Issues When Designing An Android Applicationmentioning
confidence: 99%