Moiz et al., 2022 - Google Patents
A survey of security vulnerabilities in android automotive appsMoiz et al., 2022
View PDF- Document ID
- 3138346699829365896
- Author
- Moiz A
- Alalfi M
- Publication year
- Publication venue
- Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems
External Links
Snippet
In this study, we conduct an experiment to reproduce some of the existing vulnerabilities of Android platform in Android Auto and Android Automotive platform. Some vulnerabilities specific to automotive were also examined and verified in Android Automotive platform. In …
- 235000015108 pies 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Reardon et al. | 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system | |
| JP7520913B2 (en) | System and method for detecting misuse of components connected to an in-vehicle network - Patents.com | |
| Xu et al. | Toward engineering a secure android ecosystem: A survey of existing techniques | |
| Moiz et al. | A survey of security vulnerabilities in android automotive apps | |
| Acar et al. | Sok: Lessons learned from android security research for appified software platforms | |
| Sufatrio et al. | Securing android: a survey, taxonomy, and challenges | |
| Sivakumaran et al. | A Study of the Feasibility of Co-located App Attacks against {BLE} and a {Large-Scale} Analysis of the Current {Application-Layer} Security Landscape | |
| Mandal et al. | Static analysis of Android Auto infotainment and on‐board diagnostics II apps | |
| Kafle et al. | A study of data store-based home automation | |
| Blasco et al. | Automated generation of colluding apps for experimental research | |
| Wang et al. | Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications | |
| Li et al. | On discovering vulnerabilities in android applications | |
| Gadyatskaya et al. | Security in the Firefox OS and Tizen mobile platforms | |
| Pradeep et al. | Not your average app: A large-scale privacy analysis of android browsers | |
| Eriksson et al. | On the Road with Third-party Apps: Security Analysis of an In-vehicle App Platform. | |
| Choi et al. | Personal information leakage detection method using the inference-based access control model on the Android platform | |
| Strandberg et al. | Resilient shield: Reinforcing the resilience of vehicles against security threats | |
| Pese et al. | Security analysis of android automotive | |
| Panarotto et al. | Static analysis of android apps interaction with automotive can | |
| Nazzal et al. | Vulnerability classification of consumer-based IoT software | |
| Titze et al. | App-ray: User-driven and fully automated android app security assessment | |
| EP2873023B1 (en) | Technique for determining a malign or non-malign behavior of an executable file | |
| US8136157B2 (en) | Program providing device, storage medium, and vehicle-mounted information system | |
| Moreno et al. | Chrowned by an extension: abusing the Chrome DevTools protocol through the debugger API | |
| CN114817916B (en) | A system and method for detecting misuse of custom permissions in Android applications |