Analysis of the Communication Between Colluding Applications on Modern Smartphones

Modern Smartphones that implement permission-based security mechanisms suffer from attacks by colluding applications. Users are not made aware of possible implications of application collusion attacks - quite the contrary - on existing platforms, users are implicitly led to believe that by approving the installation of each application independently, they can limit the damage that an application can cause. The authors implement and analyze a number of covert and overt communication channels that enable applications to collude and therefore indirectly escalate their permissions.

Provided by: Association for Computing Machinery Topic: Mobility Date Added: Oct 2012 Format: PDF

Find By Topic