期刊文献+

Android应用程序隐私权限安全研究 被引量:7

Research on the Android Privacy Security of Application
下载PDF
导出
摘要 随着移动互联时代的到来,手机已经成为人们日常生活中使用时间最长的一个智能设备,基本上人们的生活完全离不开手机.手机上成千上万的移动应用程序给用户提供了社交、购物、游戏、工作、娱乐全方位的体验,丰富了人们的生活,但也增加了用户隐私泄露的危险.一个移动应用程序使用和收集用户的某个隐私信息到底是合理还是不合理,对于这个问题有很多的研究人员对移动应用程序的用户隐私权限安全进行了研究.首先对Android系统的隐私权限机制和存在的问题进行了阐述,然后归纳和梳理了现在Android应用程序隐私权限安全检测的解决方案,并介绍了各解决方案的主要研究思路和技术手段.最后,展望了Android应用程序隐私权限安全的未来研究方向. With the advent of the era of mobile Internet,mobile phone has become the longest used intelligent device in our daily life.Basically,our life is inseparable from mobile phone.Thousands of mobile applications on mobile phones provide users with a full range of social,shopping,games,work and entertainment enriching our lives,but also increase the risk of privacy leakage.Is it reasonable for a mobile application to use and collect certain privacy information of users?For this problem,in recent years,many researchers have studied the security of user privacy rights of mobile applications.This paper first describes the privacy security mechanism and existing problems of Android mobile applications,and summarizes and sorts out the solutions to the privacy security problems of Android mobile applications,then introduces the main research methods and technical means of various solutions in detail.Finally,this paper prospect the future research direction of privacy security of Android mobile applications.
作者 钟越 付迪阳 Zhong Yue;Fu Diyang(College of Computer Science,Sichuan University,Chengdu 610065)
出处 《信息安全研究》 2021年第3期287-292,共6页 Journal of Information Security Research
关键词 安卓 应用程序 用户隐私 安全检测 手机 Android application privacy security inspection mobile phone
  • 相关文献

参考文献4

二级参考文献42

  • 1Ritchie 0 M,Thompson K. The UNIX time-sharing system [ J ]. BellSystem Technical Journal, 1978,57(6): 1905-1929.
  • 2Qiu Lili, Zhang Yin, Wang Feng, et al. Trusted computer systemevaluation criteria [ S ]. [ S. 1. ] : National Computer Security Center,1985.
  • 3Barrera D, Kayacik H G, Van Oorschot P C, ei al. A methodologyfor empirical analysis of permission-based security models and its ap-plication to Android[ C ] //Proc of the 17th ACM Conference on Com-puter and Communications Security. New York : ACM Press, 2010 :73-84.
  • 4Felt A P, Greenwood K, Wagner D. The effectiveness of install-timepermission systems for third-party applications, UCB/EECS-2010-143[R]. Berkeley: University of California, 2010.
  • 5Felt A P, Ha E, Egelman S, et al. Android permissions: user atten-tion, comprehension, and behavior[ C ] //Proc of the 8th Symposiumon Usable Privacy and Security. New York : ACM Press, 2012 : 3.
  • 6Nauman M, Khan S, Zhang X. Apex: extending Android permissionmodel and enforcement with user-defined runtime constraints [ C ]//Proc of the 5th ACM Symposium on Information, Computer and Com-munications Security. New York:ACM Press, 2010: 328-332.
  • 7Conti M,Nguyen V T N, Crispo B. CRePE: context-related policyenforcement for Android [ M ] //Information Security. Berlin : Sprin-ger, 2011: 331-345.
  • 8Ongtang M,McLaughlin S,Enck W,et al. Semantically rich appli-cation-centric security in Android [ J ]. Security 3nd Communica-tion Networks, 2012, 5(6) : 658-673.
  • 9Davi L, Dmitrienko A, Sadeghi A R, ef al. Privilege escalationattacks on Android [ M ]//Information Security. Berlin : Springer,2011: 346-360.
  • 10Dietz M, Shekhar S, Pisetsky Y,et al. QUIRE : lightweight prove-nance for smart phone operating systems [ C ] //Proc of the 20 th USE-NIX Security Symposium. 2011.

共引文献42

同被引文献49

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部