RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks (original) (raw)
Related papers
An interrogation of Android application-based privilege escalation attacks
5th ETLTC International Conference on ICT Integration in Technical Education, University of Aizu, Japan. , 2023
A Novel Android Security Framework to Prevent Privilege Escalation Attacks
International Journal of Computer Network and Information Security, 2020
STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES
Signature-based Detection of Privilege-Escalation Attacks on Android
Tahir Waseem, Hassan Rafay, Muhammad Mubashir Khan, Jawwad Shamsi
Privilege Escalation Attacks on Android
Lecture Notes in Computer Science, 2011
Native code execution control for attack mitigation on android
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices - SPSM '13, 2013
Abusing Android permissions: A security perspective
2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2017
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating
2014 IEEE Symposium on Security and Privacy, 2014
Security analysis of permission re-delegation vulnerabilities in Android apps
Empirical Software Engineering
When the Guard failed the Droid: A case study of Android malware
ArXiv, 2020
PScout: Analyzing the Android Permission Specification
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android
2015 IEEE Symposium on Security and Privacy, 2015
A Survey of Android Security Threats and Defenses
COVERT: Compositional Analysis of Android Inter-App Permission Leakage
IEEE Transactions on Software Engineering, 2015
Security testing of second order permission re-delegation vulnerabilities in Android apps
Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, 2020
Enhancing Security of Linux-based Android Devices
The Android Platform Security Model
ACM Transactions on Privacy and Security, 2021
Android Platform Security Issues
An Overview of Security Challenges of Android Apps Permissions
2014
Recent Development and Techniques in Android Application Security
CERN European Organization for Nuclear Research - Zenodo, 2022
Modeling and Enhancing Android’s Permission System (CMU-CyLab-11-020)
2011
Automatic detection of inter-application permission leaks in Android applications
IBM Journal of Research and Development, 2000
Understanding Android Security
IEEE Security & Privacy, 2009
Google Android: A state-of-the-art review of security mechanisms
2009
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation
2020
Understanding the Root of Attack in Android Malware
International Journal of Integrated Engineering
An Empirical Evaluation of the Android Security Framework
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
Journal of Cybersecurity and Privacy
System Calls Analysis of Malwares on Android
International Journal for Information Security Research, 2017
A survey on android security: development and deployment hindrance and best practices
TELKOMNIKA JOURNAL, Ratul Sikder
TELKOMNIKA Telecommunication Computing Electronics and Control, 2020
Academic Journal of Nawroz University (AJNU), 2017
Modeling and enhancing Android’s permission system
2012
A Comprehensive Analysis of the Android Permissions System
IEEE Access, 2020
Research in Progress-Defending Android Smartphones from Malware Attacks
2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 2013