Carstens, 2018 - Google Patents
Android smartphone apps: privacy concerns of unregulated permissions on social and psychological contracts.Carstens, 2018
View PDF- Document ID
- 4120643000322763830
- Author
- Carstens K
- Publication year
External Links
Snippet
This research describes how security was being implemented in the smartphone marketplace, specifically on Android smartphones. The initial work concentrated on security and antivirus app permissions and the APIs that were called. The gap between permissions …
- 230000002155 anti-virotic 0 abstract description 385
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11886232B2 (en) | Providing a mobile communications device with access to a provider service conditioned upon a device security level determination | |
US11336458B2 (en) | Evaluating authenticity of applications based on assessing user device context for increased security | |
US9582668B2 (en) | Quantifying the risks of applications for mobile devices | |
US10482260B1 (en) | In-line filtering of insecure or unwanted mobile device software components or communications | |
Seo et al. | Detecting mobile malware threats to homeland security through static analysis | |
Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
US9438631B2 (en) | Off-device anti-malware protection for mobile devices | |
Zhou et al. | Dissecting android malware: Characterization and evolution | |
Wang et al. | MalRadar: Demystifying android malware in the new era | |
Kadir et al. | Understanding android financial malware attacks: Taxonomy, characterization, and challenges | |
Carstens | Android smartphone apps: privacy concerns of unregulated permissions on social and psychological contracts. | |
Ning | Analysis of the Latest Trojans on Android Operating System | |
Abdul Kadir | A detection framework for android financial malware | |
Nwobodo | Exploring Optimal Subsets of Statically Registered Broadcast Receivers and Permissions for the Prediction of Malicious Behavior in Android Applications | |
Nayak et al. | Android mobile platform security and malware survey | |
Govindaraj et al. | Forensics enabled secure mobile computing system for enterprises | |
Vidas | Safe Software Dissemination in Distributed Application Marketplaces |