Security testing of second order permission re-delegation vulnerabilities in Android apps.
Biniam Fisseha DemissieMariano CeccatoPublished in: MOBILESoft@ICSE (2020)
Keyphrases
- access control
- security policies
- role based access control
- security mechanisms
- information security
- security requirements
- mobile applications
- mobile apps
- android platform
- access control systems
- security vulnerabilities
- data security
- security issues
- mobile platforms
- network security
- malware detection
- development tools
- mobile devices
- android application
- security patterns
- security model
- development lifecycle
- distributed systems
- security breaches
- multi domain
- data centric
- access control policies
- security problems
- api calls
- higher order
- network management
- intrusion detection
- security threats
- trust management
- smart card
- security flaws
- network administrators
- buffer overflow
- smart phones