[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Werthmann et al., 2013 - Google Patents

PSiOS: bring your own privacy & security to iOS devices

Werthmann et al., 2013

View PDF
Document ID
17605182086745630399
Author
Werthmann T
Hund R
Davi L
Sadeghi A
Holz T
Publication year
Publication venue
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security

External Links

Snippet

Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS provides application sandboxing but assigns a generic sandboxing profile to every third-party application. However, recent attacks and incidents with benign …
Continue reading at download.hrz.tu-darmstadt.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Werthmann et al. PSiOS: bring your own privacy & security to iOS devices
Batyuk et al. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
Tam et al. The evolution of android malware and android analysis techniques
Backes et al. Appguard–fine-grained policy enforcement for untrusted android applications
Backes et al. Boxify: Full-fledged app sandboxing for stock android
Xu et al. Toward engineering a secure android ecosystem: A survey of existing techniques
Enck Defending users against smartphone apps: Techniques and future directions
Fang et al. Permission based Android security: Issues and countermeasures
Marforio et al. Application collusion attack on the permission-based security model and its implications for modern smartphone systems
Zhou et al. Taming information-stealing smartphone applications (on android)
Hornyack et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
Wang et al. Unauthorized origin crossing on mobile platforms: Threats and mitigation
Mylonas et al. Smartphone security evaluation the malware attack case
Wang et al. Compac: Enforce component-level access control in android
Han et al. Comparing mobile privacy protection through cross-platform applications
Backes et al. Appguard-real-time policy enforcement for third-party applications
Do et al. Enhancing user privacy on android mobile devices via permissions removal
Ciardo et al. SMART: Simulation and Markovian analyzer for reliability and timing
Dai Zovi Apple iOS 4 security evaluation
Zhou et al. Hybrid user-level sandboxing of third-party android apps
Mylonas et al. On the feasibility of malware attacks in smartphone platforms
Liebergeld et al. Android security, pitfalls and lessons learned
Faruki et al. Droidanalyst: Synergic app framework for static and dynamic app analysis
Bucicoiu et al. XiOS: Extended application sandboxing on iOS
Alfalqi et al. Android platform malware analysis