Show simple item record

dc.contributor.authorReardon, Joel
dc.contributor.authorFeal, Álvaro 
dc.contributor.authorWijesekera, Primal
dc.contributor.authorElazari Bar On, Amit
dc.contributor.authorVallina-Rodriguez, Narseo 
dc.contributor.authorEgelman, Serge
dc.date.accessioned2021-07-13T09:40:52Z
dc.date.available2021-07-13T09:40:52Z
dc.date.issued2019-12
dc.identifier.urihttp://hdl.handle.net/20.500.12761/778
dc.description.abstractSmartphones are general-purpose computers that store a great deal of sensitive personal information. Apps are prevented from accessing this information at will through the use of a permission system at the operating-system level. These security mechanisms are reasonable because we carry our smartphones alongside us all day, and they can gain access to our intimate communications and social network, our web browsing history, our location at all times—even if the GPS is disabled. When apps are denied permissions, however, they still have options to cheat the permission system by using side and covert channels. In our research we found a small number of such channels being actively exploited when we tested Google Play Store apps.
dc.publisherUSENIX
dc.title50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System
dc.typemagazine
dc.journal.titleUSENIX
dc.volume.number44
dc.issue.number4
dc.description.statuspub
dc.eprint.idhttp://eprints.networks.imdea.org/id/eprint/2083


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record