Login / Signup
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification.
Hamid Bagheri
Eunsuk Kang
Sam Malek
Daniel Jackson
Published in:
FM (2015)
Keyphrases
</>
user interface
object detection
database systems
mobile devices
knowledge based systems
engineering design
neural network
lightweight
intrusion detection
design process
detection method
false positives
automatic detection
mobile applications
formal proof
functional verification