Android Application Security: A Semantics and Context-Aware by Mu Zhang,Heng Yin

By Mu Zhang,Heng Yin

This SpringerBrief explains the rising cyber threats that undermine Android software protection. It additional explores the chance to leverage the state of the art semantics and context–aware concepts to protect opposed to such threats, together with zero-day Android malware, deep software program vulnerabilities, privateness breach and inadequate safeguard warnings in app descriptions. 

The authors start via introducing the heritage of the sector, explaining the final working approach, programming gains, and safety mechanisms. The authors seize the semantic-level habit of cellular functions and use it to reliably realize malware variations and zero-day malware. subsequent, they suggest an automated patch new release strategy to observe and block harmful details stream. A bytecode rewriting process is used to restrict privateness leakage. User-awareness, a key issue of safety hazards, is addressed through instantly translating security-related software semantics into normal language descriptions. widespread habit mining is used to find and compress universal semantics. for that reason, the produced descriptions are security-sensitive, human-understandable and concise.
By overlaying the historical past, present threats, and destiny paintings during this box, the short is acceptable for either pros in and advanced-level scholars operating in cellular defense and functions. it really is worthwhile for researchers, as well.

Show description

Read or Download Android Application Security: A Semantics and Context-Aware Approach (SpringerBriefs in Computer Science) PDF

Best internet & networking books

Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)

This short investigates spectrum effective and effort effective thoughts, often called cognitive radio networks (CRNs), to make sure safe cooperation among approved and unlicensed clients. The authors tackle problems with spectrum shortage, spectrum sensing, transmission functionality, trust-aware cooperation, and safe communications.

Getting Started with OpenBTS: Build Open Source Mobile Networks

Set up your individual inner most cellular community with OpenBTS, the open resource software program venture that converts among the GSM and UMTS instant radio interface and open IP protocols. With this hands-on, step by step consultant, you’ll how one can use OpenBTS to build uncomplicated, versatile, and cheap cellular networks with software program.

BTEC Level 3 National IT Student Book 1 (BTEC National for IT Practitioners)

Assets designed to help inexperienced persons of the 2010 BTEC Level 3 nationwide IT specification*. large unit insurance: scholar e-book 1 covers 14 devices together with all of the essential devices, giving novices the breadth to tailor the path to their wishes and pursuits, while mixed with scholar publication 2. practical talents and private studying and considering talents are embedded in actions during the e-book.

Advances in Computer Science and Ubiquitous Computing: CSA-CUTE2016 (Lecture Notes in Electrical Engineering)

This publication provides the mixed court cases of the eighth foreign convention on machine technological know-how and its purposes (CSA-16) and the 11st foreign convention on Ubiquitous details applied sciences and functions (CUTE 2016), either held in Bangkok, Thailand, December 19 - 21, 2016. the purpose of those conferences used to be to advertise dialogue and interplay between teachers, researchers and pros within the box of ubiquitous computing applied sciences.

Extra info for Android Application Security: A Semantics and Context-Aware Approach (SpringerBriefs in Computer Science)

Sample text

Download PDF sample

Rated 4.35 of 5 – based on 31 votes