A New Secure Android Model Based on Privilege

被引:0
|
作者
Zhang, Tao [1 ]
Wang, Zhilong [1 ]
机构
[1] Ocean Univ China, Coll Informat Sci & Engn, 238 Songling Rd, Qingdao, Shandong, Peoples R China
关键词
Android; Security model; Root; Privilege;
D O I
10.1007/978-981-10-3023-9_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Android is the most popular smartphone operating system in the world. There are many people who focus on Android security and dedicated to improve android security. There are many android vulnerabilities exposed online and attackers can use these vulnerabilities to steal our private and sensitive information and attack our device. In the paper, we propose a novel secure android model based on privilege. We create three kinds of users and grant different users different permissions. Thus, users can have more freedom and control over their android device in the model we proposed. In our secure model, users can upgrade their android operating system in time, which may enhance the security of their smartphones and protect users' sensitive information better.
引用
收藏
页码:179 / 184
页数:6
相关论文
共 50 条
  • [1] User-defined Privilege Restriction Mechanism for Secure Execution Environments on Android
    Chung, Boheung
    Jeon, Youngsung
    Kim, Jeongnyeo
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 815 - 816
  • [2] Role-based Privilege Isolation: A Novel Authorization Model for Android Smart Devices
    Das, Batsayan
    Maddali, Lakshmipadmaja
    Nallagonda, Harshita Vani
    [J]. 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 220 - 225
  • [3] Privilege Escalation Attacks on Android
    Davi, Lucas
    Dmitrienko, Alexandra
    Sadeghi, Ahmad-Reza
    Winandy, Marcel
    [J]. INFORMATION SECURITY, 2011, 6531 : 346 - +
  • [4] Privilege Escalation Detecting in Android Applications
    Zhong, Xingqiu
    Zeng, Fanping
    Cheng, Zhichao
    Xie, Niannian
    Qin, Xiaoxia
    Guo, Shuli
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 39 - 44
  • [5] Signature-based Detection of Privilege-Escalation Attacks on Android
    Niazi, Rafay Hassan
    Waseem, Tahir
    Shamsi, Jawwad Ahmed
    Khan, Muhammad Mubashir
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 44 - 49
  • [6] A Survey of Privilege Escalation Detection in Android
    Hutchinson, Shinelle
    Varol, Cihan
    [J]. 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 726 - 731
  • [7] A bill to secure medical privilege
    Little, EG
    [J]. LANCET, 1937, 1 : 349 - 349
  • [8] Development of the Android-based Secure Communication Device
    Jevremovic, Aleksandar
    Veinovic, Mladen
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), 2015, : 385 - 388
  • [9] AdDroid: Privilege Separation for Applications and Advertisers in Android
    Pearce, Paul
    Felt, Adrienne Porter
    Nunez, Gabriel
    Wagner, David
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [10] SplitSecond: Flexible Privilege Separation of Android Apps
    Lee, Jehyun
    Raja, Akshaya Venkateswara
    Gao, Debin
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 106 - 115