Security Issues in the Android Cross-Layer Architecture

Preprint English OPEN
Armando, Alessandro; Merlo, Alessio; Verderame, Luca; (2012)
  • Subject: C.1.3 | D.4.2 | Computer Science - Operating Systems | Computer Science - Cryptography and Security
    acm: ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATION

The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. We argue that such vulnerabilities are largely related to the interplay among layers composing the Android stack. Thus, ... View more
  • References (13)
    13 references, page 1 of 2

    [1] Android Development Team. Anatomy and physiology of an android.

    [2] Android Project Documentation. Android Application Security., May 2012.

    [3] A. Armando, A. Merlo, M. Migliardi, and L. Verderame. Would you mind forking this process? A denial of service attack on Android (and some countermeasures). In Proc. of the 27th IFIP International Information Security and Privacy Conference (SEC 2012), IFIP Advances in Information and Communication Technology, 376, pages 13{24. Springer, 2012.

    [4] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Univ. Darmstadt, Apr 2011.

    [5] I. Burguera, U. Zurutuza, and S. Nadjm-Therani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM'11), 2011.

    [6] E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pages 239{252, New York, NY, USA, 2011. ACM.

    [7] L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy. Privilege escalation attacks on android. In M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, editors, Information Security, volume 6531 of LNCS, pages 346{360. 2011.

    [8] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21{21, Berkeley, CA, USA, 2011. USENIX Association.

    [9] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demysti ed. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 627{638, 2011.

    [10] A. P. Fuchs, A. Chaudhuri, and J. S. Foster. Scandroid: Automated security certi cation of android applications.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository
Share - Bookmark