2019
DOI: 10.1109/access.2019.2895261
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Language-Based Android Security Using Theorem Proving Approach

Abstract: Mobile devices are an indispensable part of modern-day lives to support portable computations and context-aware communication. Android applications within a mobile device share data to support application operations and better user experience, which also increases security risks to device's data integrity and confidentiality. To analyze the security provided by the Android permissions, modern security techniques, based on the programming languages, have been used to enforce best practices for developing the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 20 publications
(51 reference statements)
0
14
0
Order By: Relevance
“…The work of [18] developed the Sorbet framework, an enforcement model that enables permissions to specific security policies. Other recent modeling approaches focused on abstracting the permission system for specific purposes, such as the permission-based model for attack defense [19] and language-based security analysis [20]. However, most papers that implemented abstract models lack a comprehensive analysis covering the permissions system's changes throughout its published releases.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The work of [18] developed the Sorbet framework, an enforcement model that enables permissions to specific security policies. Other recent modeling approaches focused on abstracting the permission system for specific purposes, such as the permission-based model for attack defense [19] and language-based security analysis [20]. However, most papers that implemented abstract models lack a comprehensive analysis covering the permissions system's changes throughout its published releases.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For this reason, static analysis requires a final manual audit of the results to discard the false positives and find the false negatives (much more complicated). However, several works confirm that different SAST tools have distinct algorithm designs as Abstract Interpretation [29][30][31], Taint Analysis [32], Theorem Provers [33], SAT Solvers [34] or Model Checking [35,36]. Therefore, combining SAST tools can find different types of vulnerabilities and therefore obtain a better combination result [6,7].…”
Section: Static Analysis Security Testingmentioning
confidence: 99%
“…Tools based on model checking can be used to check equivalence of two functions (models); however, they are constrained by the popular state explosion [37,38] problem. ere is a body of research works in the literature on formal verification of software systems [63][64][65]; however, literature review of hardware verification and simulation tools for checking Boolean functions equivalence is included in this section.…”
Section: Related Workmentioning
confidence: 99%