Inglorious Installers: Security in the Application Marketplace

@inproceedings{Anderson2010IngloriousIS,
  title={Inglorious Installers: Security in the Application Marketplace},
  author={Jonathan Anderson and Joseph Bonneau and Frank Stajano},
  booktitle={WEIS},
  year={2010}
}
From mobile phones to social networks, installing and running third-party applications can be risky. Installing applications often requires running unverified, untrustworthy code with the privilege of a system administrator, allowing it to compromise the security of user data and the operating system. Once installed, applications on most platforms can access anything that a user can: a web browser can read users’ e-mail and an e-mail client can access browsing history. Computer scientists have… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 19 CITATIONS

Third Party Tracking in the Mobile Ecosystem

  • WebSci
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Dude, ask the experts!: Android resource access permission recommendation with RecDroid

  • 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 43 REFERENCES

Thinking Inside the Box: System-Level Failures of Tamper Proofing

  • 2008 IEEE Symposium on Security and Privacy (sp 2008)
  • 2008
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Monetizing Firefox Extensions

D. Glazman
  • In Proceedings of the Mozilla Add-ons Workshop Berlin
  • 2009
VIEW 1 EXCERPT

Monetizing Firefox Extensions

D. Glazman
  • In Proceedings of the Mozilla Add-ons Workshop Berlin
  • 2009
VIEW 1 EXCERPT

Native Client: A Sandbox for Portable, Untrusted x86 Native Code

  • IEEE Symposium on Security and Privacy
  • 2009
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…