Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/959
Full metadata record
DC FieldValueLanguage
dc.rights.licenseAll Open Access, Green-
dc.contributor.authorBhandari S.en_US
dc.contributor.authorJaballah W.B.en_US
dc.contributor.authorJain V.en_US
dc.contributor.authorLaxmi V.en_US
dc.contributor.authorZemmari A.en_US
dc.contributor.authorGaur M.S.en_US
dc.contributor.authorMosbah M.en_US
dc.contributor.authorConti M.en_US
dc.date.accessioned2023-11-30T08:57:28Z-
dc.date.available2023-11-30T08:57:28Z-
dc.date.issued2017-
dc.identifier.issn0167-4048-
dc.identifier.otherEID(2-s2.0-85025708049)-
dc.identifier.urihttps://dx.doi.org/10.1016/j.cose.2017.07.002-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/959-
dc.description.abstractWith the digital breakthrough, smart phones have become very essential component for many routine tasks like shopping, paying bills, transferring money, instant messaging, emails etc. Mobile devices are very attractive attack surface for cyber thieves as they hold personal details (accounts, locations, contacts, photos) and have potential capabilities for eavesdropping (with cameras/microphone, wireless connections). Android, being the most popular, is the target of malicious hackers who are trying to use Android app as a tool to break into and control device. Android malware authors use many anti-analysis techniques to hide from analysis tools. Academic researchers and commercial anti-malware companies are putting great effort to detect such malicious apps. They are making use of the combinations of static, dynamic and behavior-based analysis techniques. Despite of all the security mechanisms provided by Android, apps can carry out malicious actions through inter-app communication. One such inter-app communication threats is collusion. In collusion, malicious functionality is divided across multiple apps. Each participating app accomplishes its part and communicate information to another app through Inter Component Communication (ICC). ICC does not require any special permissions. Also there is no compulsion to inform user about the communication. Each participating app needs to request a minimal set of privileges, which may make it appear benign to current state-of-the-art techniques that analyze one app at a time. There are many surveys on app analysis techniques in Androiden_US
dc.description.abstracthowever they focus on single-app analysis. This survey highlights several inter-app communication threats, in particular collusion among multiple-apps. In this paper, we present Android vulnerabilities that may be exploited for carrying privilege escalation attacks, privacy leakage and collusion attacks. We cover the existing threat analysis, scenarios, and a detailed comparison of tools for intra- and inter-app analysis. To the best of our knowledge this is the first survey on inter-app communication threats, app collusion and state-of-the-art detection tools in Android. © 2017 Elsevier Ltden_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.sourceComputers and Securityen_US
dc.subjectApp collusionen_US
dc.subjectInter component communicationen_US
dc.subjectInter-app communicationen_US
dc.subjectMulti-app analysisen_US
dc.subjectPrivacy leakageen_US
dc.titleAndroid inter-app communication threats and detection techniquesen_US
dc.typeReviewen_US
Appears in Collections:Review

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.