Abstract
In this article Nikola Milosevic explains a threat model for analyzing android security and how to look deeper in how android permissions are used and how they can be used maliciously. The article will especially analyze combinations of android permission that could be maliciously used for stealing private information, disable phone or cost user money.
Original language | English |
---|---|
Pages (from-to) | 28-31 |
Number of pages | 4 |
Journal | Digital forensics magazine |
Volume | 1 |
Issue number | 18 |
Publication status | Published - Feb 2014 |
Keywords
- android security
- mobile malware