Muthumanickam et al., 2020 - Google Patents
A collaborative policy-based security scheme to enforce resource access controlling mechanismMuthumanickam et al., 2020
- Document ID
- 12250539034649021931
- Author
- Muthumanickam K
- Senthil Mahesh P
- Publication year
- Publication venue
- Wireless Networks
External Links
Snippet
Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model …
- 230000002708 enhancing 0 title description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rashidi et al. | A Survey of Android Security Threats and Defenses. | |
Tam et al. | The evolution of android malware and android analysis techniques | |
Faruki et al. | Android security: a survey of issues, malware penetration, and defenses | |
Sufatrio et al. | Securing android: a survey, taxonomy, and challenges | |
Fang et al. | Permission based Android security: Issues and countermeasures | |
Shabtai et al. | Google android: A state-of-the-art review of security mechanisms | |
Jung et al. | Repackaging attack on android banking applications and its countermeasures | |
Spensky et al. | Sok: Privacy on mobile devices–it’s complicated | |
Banuri et al. | An Android runtime security policy enforcement framework | |
Choi et al. | Personal information leakage detection method using the inference-based access control model on the Android platform | |
Barlev et al. | Secure yet usable: Protecting servers and Linux containers | |
Tanabe et al. | Evasive malware via identifier implanting | |
Bakour et al. | A deep camouflage: evaluating android’s anti-malware systems robustness against hybridization of obfuscation techniques with injection attacks | |
Luo et al. | Anti-plugin: Don’t let your app play as an android plugin | |
Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
Kulkarni et al. | Open source android vulnerability detection tools: a survey | |
Muthumanickam et al. | A collaborative policy-based security scheme to enforce resource access controlling mechanism | |
Lee et al. | Unified security enhancement framework for the Android operating system | |
Chang et al. | Towards a multilayered permission‐based access control for extending Android security | |
Jeong et al. | SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform | |
Khadiranaikar et al. | Improving Android application security for intent based attacks | |
Schulz et al. | Android security-common attack vectors | |
Shahzad et al. | A survey on recent advances in malicious applications analysis and detection techniques for smartphones | |
Kywe et al. | Privatedroid: Private browsing mode for android | |
Saini et al. | Vulnerabilities in Android OS and Security of Android Devices |