Search
Results
-
Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems
(2011)We show that the way in which permissionbased mechanisms are used on today’s mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly execute operations that those applications, based on their declared permissions, should not be able to execute. Example operations include disclosure of users private data (e.g., phone book and ...Report