[PDF][PDF] The effectiveness of install-time permission systems for third-party applications

AP Felt, K Greenwood… - … of California at …, 2010 - digitalassets.lib.berkeley.edu
In many modern development platforms, application permissions control third-party access
to sensitive parts of the API (eg, the camera or microphone). We study install-time …

System security, platform security and usability

PC van Oorschot - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
Scalable trusted computing seeks to apply and extend the fundamental technologies of
trusted computing to large-scale systems. To provide the functionality demanded by users …

[引用][C] Android Security Research Vorlesung Secure, Trusted and Trustworthy Computing Teil I WS 2010/2011

IAR Sadeghi, MSL Davi