[go: nahoru, domu]

Carstens, 2018 - Google Patents

Android smartphone apps: privacy concerns of unregulated permissions on social and psychological contracts.

Carstens, 2018

View PDF
Document ID
4120643000322763830
Author
Carstens K
Publication year

External Links

Snippet

This research describes how security was being implemented in the smartphone marketplace, specifically on Android smartphones. The initial work concentrated on security and antivirus app permissions and the APIs that were called. The gap between permissions …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
US11886232B2 (en) Providing a mobile communications device with access to a provider service conditioned upon a device security level determination
US11336458B2 (en) Evaluating authenticity of applications based on assessing user device context for increased security
US9582668B2 (en) Quantifying the risks of applications for mobile devices
US10482260B1 (en) In-line filtering of insecure or unwanted mobile device software components or communications
Seo et al. Detecting mobile malware threats to homeland security through static analysis
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
US9438631B2 (en) Off-device anti-malware protection for mobile devices
Zhou et al. Dissecting android malware: Characterization and evolution
Wang et al. MalRadar: Demystifying android malware in the new era
Kadir et al. Understanding android financial malware attacks: Taxonomy, characterization, and challenges
Carstens Android smartphone apps: privacy concerns of unregulated permissions on social and psychological contracts.
Ning Analysis of the Latest Trojans on Android Operating System
Abdul Kadir A detection framework for android financial malware
Nwobodo Exploring Optimal Subsets of Statically Registered Broadcast Receivers and Permissions for the Prediction of Malicious Behavior in Android Applications
Nayak et al. Android mobile platform security and malware survey
Govindaraj et al. Forensics enabled secure mobile computing system for enterprises
Vidas Safe Software Dissemination in Distributed Application Marketplaces