Runtime Verification Meets Android Security.
Andreas BauerJan-Christoph KüsterGil VegliachPublished in: NASA Formal Methods (2012)
Keyphrases
- high security
- malware detection
- java card
- integrity verification
- information security
- cryptographic protocols
- intrusion detection
- model checking
- security policies
- security requirements
- security issues
- computer security
- high assurance
- security systems
- formal verification
- mobile devices
- face verification
- statistical databases
- network security
- key management
- security mechanisms
- access control
- security model
- security level
- information assurance
- security analysis
- cyber security
- location aware
- security threats
- mobile applications
- protocol specification