The Perils of Android Security Configuration

被引:4
作者
Vecchiato, Daniel [1 ]
Vieira, Marco [2 ]
Martins, Eliane [1 ]
机构
[1] Univ Estadual Campinas, Comp Inst, Campinas, SP, Brazil
[2] Univ Coimbra, Dept Informat Engn, P-3000 Coimbra, Portugal
关键词
Android; mobile; mobile applications; mobile computing; personal devices; privacy; security; smart devices; smartphones; user experience;
D O I
10.1109/MC.2016.184
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent analysis of the popular Android platform highlights common security misconfigurations as well as the respective roles that users, manufacturers, and researchers play in protecting mobile devices against cyberattacks.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 11 条
  • [1] [Anonymous], 2011, USENIX SECURITY S
  • [2] [Anonymous], 2015, 2016 INT SEC THREAT
  • [3] [Anonymous], 2016, COMPUTERWEEKLY 0504
  • [4] [Anonymous], 2016, PHON THEFT AM
  • [5] Ben-Asher N., P 13 INT C HUMAN COM, P465, DOI DOI 10.1145/2037373.2037442
  • [6] Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
  • [7] A Survey on Security for Mobile Devices
    La Polla, Mariantonietta
    Martinelli, Fabio
    Sgandurra, Daniele
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 446 - 471
  • [8] Mylonas A, 2011, SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P25
  • [9] Delegate the smartphone user? Security awareness in smartphone platforms
    Mylonas, Alexios
    Kastania, Anastasia
    Gritzalis, Dimitris
    [J]. COMPUTERS & SECURITY, 2013, 34 : 47 - 66
  • [10] A Security Configuration Assessment for Android Devices
    Vecchiato, Daniel
    Vieira, Marco
    Martins, Eliane
    [J]. 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 2299 - 2304