Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis

Download Now
Provided by: Texas A&M International University
Topic: Security
Format: PDF
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable behaviors in Android apps. An important part in the defense is the accurate analysis of Android apps. However, traditional syscall-based analysis techniques are not well-suited for Android, because they could not capture critical interactions between the application and the Android system.
Download Now

Find By Topic