[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2016 - Google Patents

Sarre: semantics-aware rule recommendation and enforcement for event paths on android

Li et al., 2016

View PDF
Document ID
5277962995662411906
Author
Li Y
Yao F
Lan T
Venkataramani G
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

This paper presents a semantics-aware rule recommendation and enforcement (SARRE) system for taming information leakage on Android. SARRE leverages statistical analysis and a novel application of minimum path cover algorithm to identify system event paths from …
Continue reading at www.fan-yao.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Li et al. Sarre: semantics-aware rule recommendation and enforcement for event paths on android
Liu et al. Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
Kollnig et al. Are iphones really better for privacy? comparative study of ios and android apps
Agarwal et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing
Li et al. How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit
Chitkara et al. Does this app really need my location? Context-aware privacy management for smartphones
Jin et al. Why are they collecting my data? inferring the purposes of network traffic in mobile apps
Continella et al. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Li et al. Privacy protection for preventing data over-collection in smart city
Elish et al. Profiling user-trigger dependence for Android malware detection
Mirsky et al. Sherlock vs moriarty: A smartphone dataset for cybersecurity research
Arslan et al. Permission-based malware detection system for android using machine learning techniques
La Polla et al. A survey on security for mobile devices
Zhou et al. Identity, location, disease and more: Inferring your secrets from android public resources
Wang et al. Understanding the purpose of permission use in mobile apps
US20130097659A1 (en) System and method for whitelisting applications in a mobile network environment
US11297505B2 (en) System and method for aggregated machine learning on indicators of compromise on mobile devices
TW200842716A (en) Spyware detection mechanism
Jing et al. Towards automated risk assessment and mitigation of mobile applications
Riad et al. Roughdroid: operative scheme for functional android malware detection
Mohsen et al. Android keylogging threat
Shrivastava et al. Android application behavioural analysis for data leakage
Elahi et al. Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones
Pennekamp et al. A survey on the evolution of privacy enforcement on smartphones and the road ahead
Wongwiwatchai et al. Detecting personally identifiable information transmission in android applications using light-weight static analysis