Results 171 to 180 of about 8,962 (209)
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACM Computing Surveys, 2015
Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works that secure Android devices.
null Sufatrio +3 more
openaire +3 more sources
Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works that secure Android devices.
null Sufatrio +3 more
openaire +3 more sources
Understanding Android Security
IEEE Security & Privacy Magazine, 2009Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying lessons and opportunities for future enhancements.
William Enck +2 more
openaire +3 more sources
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security ...
Michael Backes +3 more
openaire +1 more source
We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security ...
Michael Backes +3 more
openaire +1 more source
Secure multi-execution in Android
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019Mobile operating systems, such as Google’s Android, have become a fixed part of our daily lives and are entrusted with a plethora of private information. Congruously, their data protection mechanisms have been improved steadily over the last decade and, in particular, for Android, the research community has explored various enhancements and extensions ...
Chakraborty, Dhiman +2 more
openaire +1 more source
Android system security evaluation
2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2018This demonstration presents an application for a system security score evaluation. The security score represents overall security level of the Android OS based device. The proposed application is based on the library that uses standard Android OS API and Google SafetyNet library.
Igor Khokhlov, Leon Reznik
openaire +1 more source
2019
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to the Android Market as legitimate apps. The central issue lies at the heart of the Android permission mechanism, which is not capable of blocking malicious apps from accessing ...
Marwan Omar +4 more
openaire +1 more source
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to the Android Market as legitimate apps. The central issue lies at the heart of the Android permission mechanism, which is not capable of blocking malicious apps from accessing ...
Marwan Omar +4 more
openaire +1 more source
Vulnerabilities in Android OS and Security of Android Devices
Journal of Informatics Electrical and Electronics Engineering (JIEEE), 2022The number of malicious mobile and android based application targeting Android users and their smartphones has increase at a fast rate. In addition, these malicious harms causing application are powerful enough to download modules from remote servers which are usually run by malicious infectors, due to which unexpected events can be triggered inside ...
Mayank Singh Saini, Sheenu Rizvi
openaire +1 more source

