Hardware-assisted security enhanced Linux in embedded systems: a proposal
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Porscha: policy oriented secure content handling in Android
Proceedings of the 26th Annual Computer Security Applications Conference
Privilege escalation attacks on android
ISC'10 Proceedings of the 13th international conference on Information security
All your droid are belong to us: a survey of current android attacks
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Practical and lightweight domain isolation on Android
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Performance analysis of security enforcement on Android operating system
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Protecting health information on mobile devices
Proceedings of the second ACM conference on Data and Application Security and Privacy
Defending users against smartphone apps: techniques and future directions
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
DroidChecker: analyzing android applications for capability leak
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Rooting android --- extending the ADB by an auto-connecting wifi-accessible service
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Seeing is not believing: visual verifications through liveness analysis using mobile devices
Proceedings of the 29th Annual Computer Security Applications Conference
DR BACA: dynamic role based access control for Android
Proceedings of the 29th Annual Computer Security Applications Conference
DroidBarrier: know what is executing on your android
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Google's Android framework incorporates an operating system and software stack for mobile devices. Using a general-purpose operating system such as Linux in mobile devices has advantages but also security risks. Security-Enhanced Linux (SELinux) can help reduce potential damage from a successful attack.