{"title":"移动应用的跨平台访问权限分析","authors":"Walter Squires, Paolina Centonze","doi":"10.1145/2897073.2897717","DOIUrl":null,"url":null,"abstract":"We live in the era of mobile computing. Mobile devices havemore sensors and more capabilities than desktop computers. Forany computing device that contains sensitive information andaccesses the Internet, security is a major concern for bothenterprises and end-users. Of the mobile devices commonly inuse, iOS and Android are the prevalent platforms; each platformhas a unique architecture and security policy relating to howthey handle these sensitive permissions; due to these differencesone platform is likely more secure than the other. A deep staticand dynamic analysis of the applications available for eachplatform was conducted in order to determine on whichoverprivileged applications were more prevalent.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Cross-Platform Access-Rights Analysis of Mobile Applications\",\"authors\":\"Walter Squires, Paolina Centonze\",\"doi\":\"10.1145/2897073.2897717\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We live in the era of mobile computing. Mobile devices havemore sensors and more capabilities than desktop computers. Forany computing device that contains sensitive information andaccesses the Internet, security is a major concern for bothenterprises and end-users. Of the mobile devices commonly inuse, iOS and Android are the prevalent platforms; each platformhas a unique architecture and security policy relating to howthey handle these sensitive permissions; due to these differencesone platform is likely more secure than the other. A deep staticand dynamic analysis of the applications available for eachplatform was conducted in order to determine on whichoverprivileged applications were more prevalent.\",\"PeriodicalId\":296509,\"journal\":{\"name\":\"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2897073.2897717\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2897073.2897717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cross-Platform Access-Rights Analysis of Mobile Applications
We live in the era of mobile computing. Mobile devices havemore sensors and more capabilities than desktop computers. Forany computing device that contains sensitive information andaccesses the Internet, security is a major concern for bothenterprises and end-users. Of the mobile devices commonly inuse, iOS and Android are the prevalent platforms; each platformhas a unique architecture and security policy relating to howthey handle these sensitive permissions; due to these differencesone platform is likely more secure than the other. A deep staticand dynamic analysis of the applications available for eachplatform was conducted in order to determine on whichoverprivileged applications were more prevalent.