[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Muthumanickam et al., 2020 - Google Patents

A collaborative policy-based security scheme to enforce resource access controlling mechanism

Muthumanickam et al., 2020

Document ID
12250539034649021931
Author
Muthumanickam K
Senthil Mahesh P
Publication year
Publication venue
Wireless Networks

External Links

Snippet

Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Rashidi et al. A Survey of Android Security Threats and Defenses.
Tam et al. The evolution of android malware and android analysis techniques
Faruki et al. Android security: a survey of issues, malware penetration, and defenses
Sufatrio et al. Securing android: a survey, taxonomy, and challenges
Fang et al. Permission based Android security: Issues and countermeasures
Shabtai et al. Google android: A state-of-the-art review of security mechanisms
Jung et al. Repackaging attack on android banking applications and its countermeasures
Spensky et al. Sok: Privacy on mobile devices–it’s complicated
Banuri et al. An Android runtime security policy enforcement framework
Choi et al. Personal information leakage detection method using the inference-based access control model on the Android platform
Barlev et al. Secure yet usable: Protecting servers and Linux containers
Tanabe et al. Evasive malware via identifier implanting
Bakour et al. A deep camouflage: evaluating android’s anti-malware systems robustness against hybridization of obfuscation techniques with injection attacks
Luo et al. Anti-plugin: Don’t let your app play as an android plugin
Onarlioglu et al. Sentinel: Securing legacy firefox extensions
Kulkarni et al. Open source android vulnerability detection tools: a survey
Muthumanickam et al. A collaborative policy-based security scheme to enforce resource access controlling mechanism
Lee et al. Unified security enhancement framework for the Android operating system
Chang et al. Towards a multilayered permission‐based access control for extending Android security
Jeong et al. SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
Khadiranaikar et al. Improving Android application security for intent based attacks
Schulz et al. Android security-common attack vectors
Shahzad et al. A survey on recent advances in malicious applications analysis and detection techniques for smartphones
Kywe et al. Privatedroid: Private browsing mode for android
Saini et al. Vulnerabilities in Android OS and Security of Android Devices