[go: up one dir, main page]

Moiz et al., 2022 - Google Patents

A survey of security vulnerabilities in android automotive apps

Moiz et al., 2022

View PDF
Document ID
3138346699829365896
Author
Moiz A
Alalfi M
Publication year
Publication venue
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems

External Links

Snippet

In this study, we conduct an experiment to reproduce some of the existing vulnerabilities of Android platform in Android Auto and Android Automotive platform. Some vulnerabilities specific to automotive were also examined and verified in Android Automotive platform. In …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

Publication Publication Date Title
Reardon et al. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
JP7520913B2 (en) System and method for detecting misuse of components connected to an in-vehicle network - Patents.com
Xu et al. Toward engineering a secure android ecosystem: A survey of existing techniques
Moiz et al. A survey of security vulnerabilities in android automotive apps
Acar et al. Sok: Lessons learned from android security research for appified software platforms
Sufatrio et al. Securing android: a survey, taxonomy, and challenges
Sivakumaran et al. A Study of the Feasibility of Co-located App Attacks against {BLE} and a {Large-Scale} Analysis of the Current {Application-Layer} Security Landscape
Mandal et al. Static analysis of Android Auto infotainment and on‐board diagnostics II apps
Kafle et al. A study of data store-based home automation
Blasco et al. Automated generation of colluding apps for experimental research
Wang et al. Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications
Li et al. On discovering vulnerabilities in android applications
Gadyatskaya et al. Security in the Firefox OS and Tizen mobile platforms
Pradeep et al. Not your average app: A large-scale privacy analysis of android browsers
Eriksson et al. On the Road with Third-party Apps: Security Analysis of an In-vehicle App Platform.
Choi et al. Personal information leakage detection method using the inference-based access control model on the Android platform
Strandberg et al. Resilient shield: Reinforcing the resilience of vehicles against security threats
Pese et al. Security analysis of android automotive
Panarotto et al. Static analysis of android apps interaction with automotive can
Nazzal et al. Vulnerability classification of consumer-based IoT software
Titze et al. App-ray: User-driven and fully automated android app security assessment
EP2873023B1 (en) Technique for determining a malign or non-malign behavior of an executable file
US8136157B2 (en) Program providing device, storage medium, and vehicle-mounted information system
Moreno et al. Chrowned by an extension: abusing the Chrome DevTools protocol through the debugger API
CN114817916B (en) A system and method for detecting misuse of custom permissions in Android applications