448
Views
8
CrossRef citations to date
0
Altmetric
Articles

Protecting data on android platform against privilege escalation attack

, , &
Pages 401-414 | Received 19 May 2014, Accepted 29 Oct 2014, Published online: 10 Dec 2014

References

  • S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, Xmandroid: A new Android evolution to mitigate privilege escalation attacks, Technical report, Technische Universität Darmstadt, April, 2011.
  • M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. Wallach, QUIRE: Lightweight Provenance for Smart Phone Operating Systems, Proceeding of the 20th USENIX Security Symposium, USENIX, San Francisco, CA, August, 2011, pp. 347–362.
  • W. Enck, M. Ongtang, and P. McDaniel, On Lightweight Mobile Phone Application Certification, Proceedings of the 16th ACM conference on Computer and Communications Security (CCS'09), ACM, Chicago, IL, November, 2009, pp. 235–245.
  • A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A Survey of Mobile Malware in The Wild, in 2011 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ACM, 2011. Available at http://dl.acm.org/citation.cfm?id=2046618.
  • A. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin, Permission Re-Delegation: Attacks and Defenses, Proceedings of the 20th USENIX Security Symposium, USENIX, San Francisco, CA, August, 2011, pp. 331–346.
  • Google, Android Security Overview: Rooting of Devices. Available at http://source.android.com/devices/tech/security/index.htmlhttp://source.android.com/devices/tech/security/index.html.
  • Google, Welcome to the Android Open Source Project. Available at.
  • X. Jiang, GingerMaster: First Android Malware Utilizing a Root Exploit on Android 2.3 (Gingerbread). Available at.
  • H.-T. Lee, M. Park, and S.-J. Cho, Detection and prevention of LeNa Malware on Android, J. Internet Serv. Inf. Secur. 3(3/4) (2013), pp. 63–71.
  • M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, Semantically rich application-centric security in Android, Secur. Commun. Netw. 5(6) (2009), pp. 658–673. doi: 10.1002/sec.360
  • Y. Park, C. Lee, C. Lee, J. Lim, S. Han, M. Park, and S.-j. Cho, RGBDroid: A Novel Response-based Approach to Android Privilege Escalation Attacks, Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats (LEET'12), San Jose, CA, April, 2012.
  • Y. Park, C. Lee, J. Kim, S.-J. Cho, and J. Choi, An Android security extension to protect personal information against illegal accesses and privilege escalation attacks, J. Internet Serv. Inf. Secur. 2(3/4) (2012), pp. 29–42.
  • A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, and S. Dolev, Google Android: A State-of-the-Art Review of Security Mechanisms, CoRR, Vol. abs/0912.5101, 2009.
  • S. Smalley, The Case for SE Android. Available at http://dl.packetstormsecurity.net/papers/govt/caseforseandroid.pdf.
  • T. Vidas, D. Votipka, and N. Christin, All Your Droid Are Belong To Us: A Survey of Current Android Attacks, Proceedings of the 5th Workshop on Offensive Technology, USENIX, San Francisco, CA, 2011.
  • Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, IEEE Symposium on Security and Privacy (SP), IEEE, San Francisco, CA, 2012, pp. 95–109.
  • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, Proceedings of the 19th Annual Network and Distributed System Security Symposium, Internet Society, San Diego, CA, 2012.
  • Y. Zhou, Q. Zhang, S. Zou, and X. Jian, RiskRanker: Scalable and Accurate Zero-day Android Malware Detection, in MobiSys'12, 2011. Available at http://dl.acm.org/citation.cfm?id=2307663.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.