2015
DOI: 10.1109/tse.2015.2419611
|View full text |Cite
|
Sign up to set email alerts
|

COVERT: Compositional Analysis of Android Inter-App Permission Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
72
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 105 publications
(73 citation statements)
references
References 17 publications
1
72
0
Order By: Relevance
“…Actually, this di↵erence makes these two approaches complementary to one another: type checking is good at explaining why a program was accepted while model checking is good at explaining why a program was rejected [123]. As an example, COVERT [75] first extracts relevant security specifications from a given app and then applies a formal model checking engine to verify whether the analyzed app is safe or not. For type checking, Cassandra [92] is presented to enable users of mobile devices to check whether Android apps comply with their personal privacy requirements even before installing these apps.…”
Section: Fundamental Analysis Methodsmentioning
confidence: 99%
“…Actually, this di↵erence makes these two approaches complementary to one another: type checking is good at explaining why a program was accepted while model checking is good at explaining why a program was rejected [123]. As an example, COVERT [75] first extracts relevant security specifications from a given app and then applies a formal model checking engine to verify whether the analyzed app is safe or not. For type checking, Cassandra [92] is presented to enable users of mobile devices to check whether Android apps comply with their personal privacy requirements even before installing these apps.…”
Section: Fundamental Analysis Methodsmentioning
confidence: 99%
“…In addition, users may have different concerns about the different privacy-levels of permissions. Information may be misused not only by the developers of those apps but also by the developers of other apps through an inter-app function-call approach [4].…”
Section: Introductionmentioning
confidence: 99%
“…The master thesis [32] provides an analysis of covert channels on mobile devices. COVERT [33] is a tool for compositional analysing interapp vulnerabilities. TaintDroid [34], an information-flow tracking system, provides a real time analysis by leveraging Android's virtualized execution environment.…”
Section: Detecting Malicious Inter-app Communicationmentioning
confidence: 99%