Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android

Information Security Technical Report - Tập 17 - Trang 71-80 - 2013
Daniel Schreckling1, Johannes Köstler1, Matthias Schaff1
1Institute of IT-Security and Security Law, University of Passau, Germany

Tài liệu tham khảo

BlackBerry Enterprise Solution, 2009

Castrucci, 2008, Enhancing Java ME security support with resource usage monitoring, vol. 5308, 256

Conti, 2011, Crepe: context-related policy enforcement for android, 331

Desmet, 2008, Security-by-contract on the .NET platform, Information Security Technical Report, 13, 25, 10.1016/j.istr.2008.02.001

Enck, 2010, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, 1

Enck, 2009, Understanding android security, IEEE Security & Privacy Magazine, 7, 50, 10.1109/MSP.2009.26

Heath, 2006

Hornyack, 2011, These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, 639

Nair S, Simpson P, Crispo B, Tanenbaum A. Trishul: a policy enforcement architecture for Java virtual machines. Technical Report. Amsterdam, Netherlands: Vrije Universiteit; 2008a.

Nair, 2008, Enforcing DRM policies across applications, 87

Nauman, 2010, Apex: extending android permission model and enforcement with user-defined runtime constraints, 328

Ongtang, 2010, Porscha: policy oriented secure content handling in android, 221

Philippaerts P. Security of software on mobile devices. Ph.D. thesis. Leuven, Belgium: Department of Computer Science, Faculty of Engineering; 2010.

Schreckling D, Posegga J, Hausknecht D. Constroid: data-centric access control for android. In: Proceedings of the 27th symposium on applied computing: computer security track; 2012a. p. 1478–1485.

Security overview. Technical Report. Cupertino, CA, USA: Apple Inc.; 2010.

Vandebogart, 2007, Labels and event processes in the asbestos operating system, ACM Transactions on Computer Systems (TOCS), 25, 10.1145/1314299.1314302

Windows phone 7 security model. Technical Report. Microsoft Corporation; 2010.

Yin, 2007, Panorama: capturing system-wide information flow for malware detection and analysis, 116