SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.

 

Article citations

More>>

Oberheide, J. and Miller, C. (2012) Dissecting the Android Bouncer.

has been cited by the following article:

  • TITLE: Risks behind Device Information Permissions in Android OS

    AUTHORS: Ali Alshehri, Anthony Hewins, Maria McCulley, Hani Alshahrani, Huirong Fu, Ye Zhu

    KEYWORDS: Android, Security, Privacy, Device Identifiers, Permissions

    JOURNAL NAME: Communications and Network, Vol.9 No.4, November 10, 2017

    ABSTRACT: In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.