Android Application Security: A Semantics and Context-Aware by Mu Zhang,Heng Yin

By Mu Zhang,Heng Yin

This SpringerBrief explains the rising cyber threats that undermine Android program safety. It extra explores the chance to leverage the state-of-the-art semantics and context–aware strategies to shield opposed to such threats, together with zero-day Android malware, deep software program vulnerabilities, privateness breach and inadequate defense warnings in app descriptions. 

The authors start via introducing the history of the sector, explaining the overall working method, programming beneficial properties, and safety mechanisms. The authors catch the semantic-level habit of cellular functions and use it to reliably discover malware versions and zero-day malware. subsequent, they suggest an automated patch new release strategy to become aware of and block risky info stream. A bytecode rewriting method is used to restrict privateness leakage. User-awareness, a key issue of safeguard dangers, is addressed by way of immediately translating security-related application semantics into ordinary language descriptions. widespread habit mining is used to find and compress universal semantics. for this reason, the produced descriptions are security-sensitive, human-understandable and concise.
By masking the heritage, present threats, and destiny paintings during this box, the short is acceptable for either execs in and advanced-level scholars operating in cellular safety and purposes. it truly is worthwhile for researchers, as well.

Show description

Read Online or Download Android Application Security: A Semantics and Context-Aware Approach (SpringerBriefs in Computer Science) PDF

Similar internet & networking books

JUNOS Cookbook: Time-Saving Techniques for JUNOS Software Configuration (Cookbooks (O'Reilly))

The Juniper Networks routing structures have gotten the go-to answer for center, aspect, metro and distant workplace networks, and JUNOS software program is in the back of all of it. The working method is so choked with industrial-strength routing protocols and IP thoughts that these treading into the realm of JUNOS will want explanation, rationalization, and a show off instance or .

Cloud Data Management

In perform, the layout and structure of a cloud varies between cloud companies. We current a commonplace overview framework for the functionality, availability and reliability features of varied cloud structures. We describe a standard benchmark structure for cloud databases, in particular NoSQL database as a carrier.

Advanced Parallel Processing Technologies: 11th International Symposium, APPT 2015, Jinan, China, August 20-21, 2015, Proceedings (Lecture Notes in Computer Science)

This booklet constitutes the lawsuits of the eleventh foreign Symposium on complex Parallel Processing applied sciences, APPT 2015, held in Jinan, China, in August 2015. The eight papers offered during this quantity have been rigorously reviewed and chosen from 24 submissions. They take care of the hot advances in huge info processing; parallel architectures and structures; parallel software program; parallel algorithms and purposes; and disbursed and cloud computing.

Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

This ebook constitutes the completely refereedpost-conference lawsuits of the tenth overseas convention on dangers andSecurity of net structures, quandary 2015, held in Mytilene, Lesbos Island,Greece, in July 2015. The 18 complete papers offered have been chosen from 50 submissions. The papers classes that experience lined a large variety of issues: belief and privacyissues, privateness guidelines and coverage established protocols, probability administration, riskanalysis and vulnerability evaluate, cloud platforms and cryptography, andattack and safety features.

Additional info for Android Application Security: A Semantics and Context-Aware Approach (SpringerBriefs in Computer Science)

Sample text

Download PDF sample

Rated 4.84 of 5 – based on 33 votes