期刊文献+

基于Android系统的隐私保护技术综述 被引量:1

Survey of privacy protection techniques based on Android
下载PDF
导出
摘要 智能手机用户的隐私泄露问题日趋严重。为此研究了Android的系统框架及安全机制,包括沙盒、应用签名、权限机制。着重研究了Android系统中间件层的安全增强方法,列举了系统易受攻击的种类,总结了现有的隐私保护技术,包括应用程序安装时权限机制的扩展,运行时的动态权限监测以及隐私数据的保护。 In recent years, the problem of privacy leak of the smart phone users is getting worse and worse. For this, the system framework of Android and its security mechanisms are introduced, including the sandboxing, application signing, and permission mechanism. Security enhancement in the Android system's middleware layer is researched. The types of system that is vulnerable are listed and the existing privacy protection techniques are summed up, including the extension of permissions mechanism during the installation process of an application, run-time monitoring of the dynamic permissions and the protection of privacy data.
出处 《计算机时代》 2013年第12期7-11,共5页 Computer Era
基金 国家自然科学基金(No.61003210) 江苏省"六大人才高峰"项目(No.11-C-028)
关键词 ANDROID系统 隐私泄露 安全机制 隐私保护 Android system privacy leak security mechanisms privacy protection
  • 相关文献

参考文献11

  • 1北京网秦天下有限公司.2013上半年全球手机安全报告[Z].北京网秦夫下有限公司,2013.
  • 2Bugiel, Sven, et al. "Xmandroid: A new android evolution to mitigate privilege escalation attacks." Technische Universitiit Darmstadt, Technical Report TR-2011-04 (2011).
  • 3Enck, William, Machigar Ongtang, and Patrick McDaniel. "On lightweight mobile phone application certification." Proceedings of the 16th ACM conference on Computer and communications security. ACM,2009:235-245.
  • 4Ongtang, Machigar, et al. "Semantically rich application-centric security in Android." Security and Communication Networks 5.6(2012):658-673.
  • 5Nauman, Mohammad, Sohail Khan, and Xinwen Zhang. "Apex: extending android permission model and enforcement with us- er-defined runtime constraints." Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM,2010:328-332.
  • 6Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposiums2011.
  • 7Dietz, Michael, et al. "QUIRE: Lightweight Provenance for Smart Phone Operating Systems." USENIX Security Symposium,2011.
  • 8Conti, Mauro Vu Thien Nga Nguyen, and Bruno Crispo. "CREPE: Context-related policy enforcement for Android." Information Security. Srrinqer Berlin Heidelberg,2011:331-345.
  • 9Zhou, Yajin, et al. "Taming information-stealing smartphone applications {on android)." Trust and Trustworthy Computing. Sorinaer Berlin Heidelbera.2011:93-107.
  • 10Beresford, Alastair R., et al. "MockDroid: trading privacy for application functionality on smartphones." Proceedings of the 12th workshop on mobile computing systems and applications. ACM,2011:49-54.

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部