Date Added: Sep 2012
The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. The authors argue that such vulnerabilities are largely related to the interplay among layers com-posing the Android stack. Thus, they also argue that such interplay has been underestimated from a security point-of-view and a systematic analysis of the Android interplay has not been carried out yet. To this aim, in this paper, the authors provide a simple model of the Android cross-layer interactions based on the concept of flow, as a basis for analyzing the Android interplay.