2016
DOI: 10.1109/mc.2016.184
|View full text |Cite
|
Sign up to set email alerts
|

The Perils of Android Security Configuration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…To be on the safer side always make sure that only apps published in trusted and well-known market place like Google play are download and installed. Disabling application download from poorly trusted sharing channels can protect from accidental installation of poorly trusted or malicious packages (Vecchiato et al, 2016).…”
Section: Permission Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…To be on the safer side always make sure that only apps published in trusted and well-known market place like Google play are download and installed. Disabling application download from poorly trusted sharing channels can protect from accidental installation of poorly trusted or malicious packages (Vecchiato et al, 2016).…”
Section: Permission Systemmentioning
confidence: 99%
“…An individual smart-phone uses various technologies i.e. music player, telephone, advanced camera and much more, which may contain directions for serious roles to abuse different attack routes (Vecchiato et al, 2016).…”
Section: Permission Systemmentioning
confidence: 99%
“…This example illustrates the problem of platform fragmentation. Platform fragmentation occurs when the same operating system, software application and/or hardware component are bundled by multiple entities, with each bundler providing different customizations [35]. A real-world example that demonstrates how Linux platform fragmentation complicates SCAP checklist development is the SCAP Security Guide (SSG) Project [27].…”
Section: Scap Reuse In Manufacturing Environmentsmentioning
confidence: 99%
“…Vecchiato et al [35] have studied configuration assessment data from more than 500 Android smartphones and have found several recurring misconfigurations, the most common being weak passwords and overly-permissive network settings. Android device configuration compliance is an interesting SCAP use case because its platform fragmentation challenges parallel those encountered in manufacturing environments.…”
Section: Relevant Research and Standardsmentioning
confidence: 99%
See 1 more Smart Citation