Reference Hub2
Android Permission System Violation: Case Study and Refinement

Android Permission System Violation: Case Study and Refinement

Kyoung Soo Han, Yeoreum Lee, Biao Jiang, Eul Gyu Im
Copyright: © 2013 |Volume: 4 |Issue: 1 |Pages: 12
ISSN: 1947-8585|EISSN: 1947-8593|EISBN13: 9781466631472|DOI: 10.4018/jeei.2013010102
Cite Article Cite Article

MLA

Han, Kyoung Soo, et al. "Android Permission System Violation: Case Study and Refinement." IJEEI vol.4, no.1 2013: pp.16-27. http://doi.org/10.4018/jeei.2013010102

APA

Han, K. S., Lee, Y., Jiang, B., & Im, E. G. (2013). Android Permission System Violation: Case Study and Refinement. International Journal of E-Entrepreneurship and Innovation (IJEEI), 4(1), 16-27. http://doi.org/10.4018/jeei.2013010102

Chicago

Han, Kyoung Soo, et al. "Android Permission System Violation: Case Study and Refinement," International Journal of E-Entrepreneurship and Innovation (IJEEI) 4, no.1: 16-27. http://doi.org/10.4018/jeei.2013010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Android from its competitors. However, IAC also facilitates malicious applications that can collude in attacks of privilege escalation. In this paper, the authors demonstrate with case studies that all IAC channels can potentially be utilized for privilege escalation attacks, and the authors propose a refinement to solve this problem by enforcing IAC permissions and exposing IAC to users.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.