Bugiel et al., 2012 - Google Patents
Towards a framework for android security modules: Extending se android type enforcement to android middlewareBugiel et al., 2012
View PDF- Document ID
- 18112366308794608420
- Author
- Bugiel S
- Heuser S
- Sadeghi A
- Darmstadt T
- Publication year
- Publication venue
- Intel Collaborative Research Institute for Secure Computing
External Links
Snippet
Smartphones and tablets have become an integral part of our daily life. They increasingly store and process security and privacy sensitive data which makes them attractive targets for attackers. In particular for the popular Android OS, a number of security extensions have …
- 238000000034 method 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45554—Instruction set architectures of guest OS and hypervisor or native processor differ, e.g. Bochs or VirtualPC on PowerPC MacOS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/30—Arrangements for executing machine-instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3004—Arrangements for executing specific machine instructions to perform operations on memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bugiel et al. | Flexible and fine-grained mandatory access control on android for diverse security and privacy policies | |
Mayrhofer et al. | The android platform security model | |
US9916475B2 (en) | Programmable interface for extending security of application-based operating system | |
Heuser et al. | {ASM}: a programmable interface for extending android security | |
Bugiel et al. | Practical and lightweight domain isolation on android | |
Bugiel et al. | Towards Taming Privilege-Escalation Attacks on Android. | |
Russello et al. | MOSES: supporting operation modes on smartphones | |
Fang et al. | Permission based Android security: Issues and countermeasures | |
Bugiel et al. | Xmandroid: A new android evolution to mitigate privilege escalation attacks | |
AU2012290796B2 (en) | Sandboxing technology for webruntime system | |
Marforio et al. | Application collusion attack on the permission-based security model and its implications for modern smartphone systems | |
US8893225B2 (en) | Method and apparatus for secure web widget runtime system | |
US20080066187A1 (en) | Mobile Wireless Device with Protected File System | |
Aafer et al. | AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. | |
Bugiel et al. | Towards a framework for android security modules: Extending se android type enforcement to android middleware | |
Chan et al. | A privilege escalation vulnerability checking system for android applications | |
Schreckling et al. | Constroid: data-centric access control for android | |
Muthukumaran et al. | Protecting the integrity of trusted applications in mobile phone systems | |
Fledel et al. | Google android: an updated security review | |
EP2581853B1 (en) | Method and apparatus for secure web widget runtime system | |
Ratazzi | Understanding and improving security of the Android operating system | |
Dar | A novel approach to restrict the access of malicious applications in android | |
Bugiel | Establishing mandatory access control on Android OS | |
El-Serngawy et al. | Securing business data on android smartphones | |
Lyvas | Security and privacy enhancing mechanisms for the android operating system |