2015 Global Conference on Communication Technologies (GCCT) 2015
DOI: 10.1109/gcct.2015.7342779
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement on privacy permission management for Android apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Apex (Nauman et al, 2010) propose a mechanism for users to carefully grant permissions to apps based on runtime contextual information, such as the device location or how frequently a resource has been previously used. Other solutions such as (Hornyack et al, 2011;Shinde and Sambare, 2015;Liu et al, 2016a;Rashidi et al, 2016;Chen et al, 2017;Raval et al, 2019) proposed permission configuration interface that will allow users to control the activities of third-party apps. FlaskDroid (Bugiel et al, 2013) on the other hand, provides compulsory access control on Android's middleware and kernel layers to avert unwanted information disclosure.…”
Section: Low-level Modificationmentioning
confidence: 99%
“…Apex (Nauman et al, 2010) propose a mechanism for users to carefully grant permissions to apps based on runtime contextual information, such as the device location or how frequently a resource has been previously used. Other solutions such as (Hornyack et al, 2011;Shinde and Sambare, 2015;Liu et al, 2016a;Rashidi et al, 2016;Chen et al, 2017;Raval et al, 2019) proposed permission configuration interface that will allow users to control the activities of third-party apps. FlaskDroid (Bugiel et al, 2013) on the other hand, provides compulsory access control on Android's middleware and kernel layers to avert unwanted information disclosure.…”
Section: Low-level Modificationmentioning
confidence: 99%
“…Static detection methods [8] mainly concern the analysis of signature information, permission information of APKs. Dynamic detection methods [9], [10], [11] can trigger the malicious behavior of malicious programs by running android applications. Common dynamic testing tools include Monkey, MonkeyRunner, TaintDroid, droidBox and so on [12].…”
Section: Related Workmentioning
confidence: 99%