RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks (original) (raw)

An interrogation of Android application-based privilege escalation attacks

Arul Kumar Natarajan

5th ETLTC International Conference on ICT Integration in Technical Education, University of Aizu, Japan. , 2023

View PDFchevron_right

A Novel Android Security Framework to Prevent Privilege Escalation Attacks

Lingges arulsamy

International Journal of Computer Network and Information Security, 2020

View PDFchevron_right

STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES

Rejo Mathew

View PDFchevron_right

Signature-based Detection of Privilege-Escalation Attacks on Android

Tahir Waseem, Hassan Rafay, Muhammad Mubashir Khan, Jawwad Shamsi

View PDFchevron_right

Privilege Escalation Attacks on Android

Alexandra Dmitrienko

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Native code execution control for attack mitigation on android

Julian Schütte

Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices - SPSM '13, 2013

View PDFchevron_right

Abusing Android permissions: A security perspective

Iman Almomani

2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2017

View PDFchevron_right

Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating

Xiaorui Pan

2014 IEEE Symposium on Security and Privacy, 2014

View PDFchevron_right

Security analysis of permission re-delegation vulnerabilities in Android apps

mariano ceccato

Empirical Software Engineering

View PDFchevron_right

When the Guard failed the Droid: A case study of Android malware

Chen Hajaj

ArXiv, 2020

View PDFchevron_right

PScout: Analyzing the Android Permission Specification

Zhen Huang

View PDFchevron_right

Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android

Muhammad naveed

2015 IEEE Symposium on Security and Privacy, 2015

View PDFchevron_right

A Survey of Android Security Threats and Defenses

Carol Fung, Bahman Rashidi

View PDFchevron_right

COVERT: Compositional Analysis of Android Inter-App Permission Leakage

joshua garcia

IEEE Transactions on Software Engineering, 2015

View PDFchevron_right

Security testing of second order permission re-delegation vulnerabilities in Android apps

mariano ceccato

Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, 2020

View PDFchevron_right

Enhancing Security of Linux-based Android Devices

Kamer Ali Yüksel

View PDFchevron_right

The Android Platform Security Model

Jeffrey Vander Stoep

ACM Transactions on Privacy and Security, 2021

View PDFchevron_right

Android Platform Security Issues

Editor IJCS, Михаил Романеев

View PDFchevron_right

An Overview of Security Challenges of Android Apps Permissions

Sakshi Dhama

2014

View PDFchevron_right

Recent Development and Techniques in Android Application Security

Rushali Pawade

CERN European Organization for Nuclear Research - Zenodo, 2022

View PDFchevron_right

Modeling and Enhancing Android’s Permission System (CMU-CyLab-11-020)

Lujo Bauer

2011

View PDFchevron_right

Automatic detection of inter-application permission leaks in Android applications

Marco Pistoia

IBM Journal of Research and Development, 2000

View PDFchevron_right

Understanding Android Security

Daniel Wicaksono

IEEE Security & Privacy, 2009

View PDFchevron_right

Google Android: A state-of-the-art review of security mechanisms

Shlomi Dolev

2009

View PDFchevron_right

Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation

Jennifer Bellizzi

2020

View PDFchevron_right

Understanding the Root of Attack in Android Malware

Mohamad Aizi Salamat

International Journal of Integrated Engineering

View PDFchevron_right

An Empirical Evaluation of the Android Security Framework

L. Verderame, Alessio Merlo

View PDFchevron_right

VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics

Jennifer Bellizzi

Journal of Cybersecurity and Privacy

View PDFchevron_right

System Calls Analysis of Malwares on Android

Franklin Tchakounté

View PDFchevron_right

Protection Against Broadcast Based Runtime Information Gathering on an Unrooted Android Operating System

Altaf shaikh

International Journal for Information Security Research, 2017

View PDFchevron_right

A survey on android security: development and deployment hindrance and best practices

TELKOMNIKA JOURNAL, Ratul Sikder

TELKOMNIKA Telecommunication Computing Electronics and Control, 2020

View PDFchevron_right

Android Security: A Review

Omar Alzakholi

Academic Journal of Nawroz University (AJNU), 2017

View PDFchevron_right

Modeling and enhancing Android’s permission system

Lujo Bauer

2012

View PDFchevron_right

A Comprehensive Analysis of the Android Permissions System

Iman Almomani

IEEE Access, 2020

View PDFchevron_right

Research in Progress-Defending Android Smartphones from Malware Attacks

Marwan Omer, Maurice Dawson

2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 2013

View PDFchevron_right