Apex: extending Android permission model and enforcement with user-defined runtime constraints
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Analyzing inter-application communication in Android
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Proceedings of the 18th ACM conference on Computer and communications security
Hi-index | 0.00 |
Android OS have several security vulnerabilities. Most of existing proposals require extensive modification of Android kernel or application framework. So, they are not feasible for end users which use stock Android OS. In this paper, we present a novel application market system which protect users from piracy by malicious third-party applications installed in their devices without any modification of Android system. Our market system grants users the ability to monitor and control applications' malicious behaviors at runtime by inserting instrumentation codes into each application in its repository. Experimental results show that our market system is effective at preventing applications' malicious behaviors.