Reputation based security model for android applicationsReportar como inadecuado




Reputation based security model for android applications - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Luleå University of Technology.Booth, Todd Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0003-0593-1253Andersson, Karl Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0003-0244-3561 2012 (English)In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications - TrustCom-2012: 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, Piscataway, NJ: IEEE Computer Society Press , 2012, 896-901 p.Conference paper, Published paper (Refereed)

Abstract [en] : The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers’ cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

Place, publisher, year, edition, pages: Piscataway, NJ: IEEE Computer Society Press , 2012. 896-901 p.

Keyword [en] : Smartphones, Android OS, SmartphReputation based security, Inter Process Communication, Information technology - Computer science

Keyword [sv] : Informationsteknik - Datorvetenskap

National Category : Media and Communication Technology Information Systems, Social aspects

Research subject: Mobile and Pervasive Computing; Computer and Systems Science

Identifiers: URN: urn:nbn:se:ltu:diva-29430DOI: 10.1109/TrustCom.2012.236Local ID: 2e89fc27-ef7d-40f1-823d-2b148166ac0dISBN: 978-0-7695-4745-9 (print)OAI: oai:DiVA.org:ltu-29430DiVA: diva2:1002654

Conference: International Conference on Trust, Security and Privacy in Computing and Communications : 25/06/2012 - 27/06/2012

Projects: NIMO - Nordic Interaction and Mobility Research Platform

Note: Godkänd; 2012; 20120424 (karand)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2017-01-03Bibliographically approved



Autor: Tesfay, Welderufael Berhane

Fuente: http://ltu.diva-portal.org/







Documentos relacionados