A general attack model based on Android system vulnerability
Various kinds of vulnerabilities in Android system bring great threats to the platform. The vulnerability exploitation technology,the security of mobile operating systems and the security of Android ecosystem have become a research focus in both industry and academia. The exploitation of several typ...
Saved in:
Main Authors: | Xihai DENG, Weimiao FENG, Luping MA, Ying LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2016-10-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016254/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A detection method of Android system vulnerabilities based on matching
by: iayuan ZHANGJ
Published: (2016-05-01) -
Research on context-aware Android application vulnerability detection
by: Jiawei QIN, et al.
Published: (2021-11-01) -
Research on key technology of vulnerability threat classification
by: Qi-xu LIU, et al.
Published: (2012-09-01) -
Automatic exploitation generation method of write-what-where vulnerability
by: Huafeng HUANG, et al.
Published: (2022-01-01) -
Research of discovering vulnerabilities of NFC applications on Android platform
by: Zhi-qiang WANG, et al.
Published: (2014-11-01)