Formal analysis of Android's permission-based security model
From MaRDI portal
Publication:4621200
Recommendations
- Verifying Android's permission model
- A certified reference validation mechanism for the permission model of Android
- Software Model Checking for Mobile Security – Collusion Detection in $$\mathbb {K}$$K
- Once root always a threat: analyzing the security threats of Android permission system
- Presenting risks introduced by Android application permissions in a user-friendly way
Cited in
(11)- Mining API calls and permissions for android malware detection
- Once root always a threat: analyzing the security threats of Android permission system
- Presenting risks introduced by Android application permissions in a user-friendly way
- Verifying Android's permission model
- Software Model Checking for Mobile Security – Collusion Detection in $$\mathbb {K}$$K
- A type and effect system for activation flow of components in Android programs
- A certified reference validation mechanism for the permission model of Android
- An automatically verified prototype of the Android permissions system
- An automatically verified prototype of the Tokeneer ID station specification
- A practical decision procedure for quantifier-free, decidable languages extended with restricted quantifiers
- EAdroid: providing environment adaptive security for Android system
This page was built for publication: Formal analysis of Android's permission-based security model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4621200)