Android Custom Permissions Demystified: A Comprehensive Security Evaluation.
Rui LiWenrui DiaoZhou LiShishuai YangShuang LiShanqing GuoPublished in: IEEE Trans. Software Eng. (2022)
Keyphrases
- access control
- mobile devices
- domain specific
- intrusion detection
- information security
- smart phones
- information assurance
- malware detection
- role based access control
- security model
- security requirements
- statistical databases
- application specific
- key management
- data security
- neural network
- evaluation criteria
- mobile phone
- real world