Li et al., 2016 - Google Patents
Sarre: semantics-aware rule recommendation and enforcement for event paths on androidLi et al., 2016
View PDF- Document ID
- 5277962995662411906
- Author
- Li Y
- Yao F
- Lan T
- Venkataramani G
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
This paper presents a semantics-aware rule recommendation and enforcement (SARRE) system for taming information leakage on Android. SARRE leverages statistical analysis and a novel application of minimum path cover algorithm to identify system event paths from …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Sarre: semantics-aware rule recommendation and enforcement for event paths on android | |
Liu et al. | Privacy risk analysis and mitigation of analytics libraries in the android ecosystem | |
Kollnig et al. | Are iphones really better for privacy? comparative study of ios and android apps | |
Agarwal et al. | ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing | |
Li et al. | How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit | |
Chitkara et al. | Does this app really need my location? Context-aware privacy management for smartphones | |
Jin et al. | Why are they collecting my data? inferring the purposes of network traffic in mobile apps | |
Continella et al. | Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. | |
Li et al. | Privacy protection for preventing data over-collection in smart city | |
Elish et al. | Profiling user-trigger dependence for Android malware detection | |
Mirsky et al. | Sherlock vs moriarty: A smartphone dataset for cybersecurity research | |
Arslan et al. | Permission-based malware detection system for android using machine learning techniques | |
La Polla et al. | A survey on security for mobile devices | |
Zhou et al. | Identity, location, disease and more: Inferring your secrets from android public resources | |
Wang et al. | Understanding the purpose of permission use in mobile apps | |
US20130097659A1 (en) | System and method for whitelisting applications in a mobile network environment | |
US11297505B2 (en) | System and method for aggregated machine learning on indicators of compromise on mobile devices | |
TW200842716A (en) | Spyware detection mechanism | |
Jing et al. | Towards automated risk assessment and mitigation of mobile applications | |
Riad et al. | Roughdroid: operative scheme for functional android malware detection | |
Mohsen et al. | Android keylogging threat | |
Shrivastava et al. | Android application behavioural analysis for data leakage | |
Elahi et al. | Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones | |
Pennekamp et al. | A survey on the evolution of privacy enforcement on smartphones and the road ahead | |
Wongwiwatchai et al. | Detecting personally identifiable information transmission in android applications using light-weight static analysis |