[PDF][PDF] The effectiveness of install-time permission systems for third-party applications
AP Felt, K Greenwood… - … of California at …, 2010 - digitalassets.lib.berkeley.edu
In many modern development platforms, application permissions control third-party access
to sensitive parts of the API (eg, the camera or microphone). We study install-time …
to sensitive parts of the API (eg, the camera or microphone). We study install-time …
System security, platform security and usability
PC van Oorschot - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
Scalable trusted computing seeks to apply and extend the fundamental technologies of
trusted computing to large-scale systems. To provide the functionality demanded by users …
trusted computing to large-scale systems. To provide the functionality demanded by users …
[引用][C] Android Security Research Vorlesung Secure, Trusted and Trustworthy Computing Teil I WS 2010/2011
IAR Sadeghi, MSL Davi