{"title":"Coordinated attack research between Android applications and solutions","authors":"Xiang-dong Qu, Ge Yu","doi":"10.1109/ICSESS.2014.6933668","DOIUrl":null,"url":null,"abstract":"This article mainly discusses the the Android's security mechanism and the possibility of the coordinated attack caused by the android application's component structure. Then we put forward the data filtering solution and the implement for the data transfer of the android applications. This solution is based on the k-divided bloom filter. At the end we evaluate the experiment results. We could see that the solution can effectively resist the coordinated attack from the applications.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"23 1","pages":"718-722"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 5th International Conference on Software Engineering and Service Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2014.6933668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This article mainly discusses the the Android's security mechanism and the possibility of the coordinated attack caused by the android application's component structure. Then we put forward the data filtering solution and the implement for the data transfer of the android applications. This solution is based on the k-divided bloom filter. At the end we evaluate the experiment results. We could see that the solution can effectively resist the coordinated attack from the applications.