SurgeScan: Enforcing security policies on untrusted third-party Android libraries.
Jonathan VronskyRyan StevensHao ChenPublished in: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2017)
Keyphrases
- third party
- security policies
- access control
- security management
- network security
- distributed systems
- access control systems
- mobile devices
- api calls
- security requirements
- personal information
- mashup
- malware detection
- reverse logistics
- mobile applications
- access control policies
- social networking
- visual basic
- computer networks
- sensitive information
- private information