An Adaptive Android Security Extension against Privilege Escalation Attacks.
Yang XuGuojun WangJu RenYaoxue ZhangPublished in: ISPA/IUCC (2017)
Keyphrases
- security policies
- security threats
- security problems
- security mechanisms
- security measures
- cyber attacks
- security protocols
- java card
- security vulnerabilities
- computer security
- malware detection
- malicious attacks
- security breaches
- security flaws
- malicious users
- security risks
- cryptographic protocols
- secure routing
- security issues
- countermeasures
- denial of service attacks
- security requirements
- fault injection
- information leakage
- stream cipher
- security management
- mobile devices
- chosen plaintext
- information security
- network security
- intrusion detection and prevention
- access control
- smart card
- insider attacks
- unauthorized access
- block cipher
- intrusion prevention
- cryptographic algorithms
- computer networks
- key management
- identity theft
- malicious nodes
- intrusion detection
- access control policies
- malicious activities
- attack scenarios
- resource constrained
- smart phones
- biometric template
- personal information
- detect malicious
- defense mechanisms
- dos attacks
- user authentication
- authentication scheme
- distributed systems