首页> 外文会议>17th ACM conference on computer and communications security 2010 >A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
【24h】

A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android

机译:基于权限的安全模型实证分析的方法论及其在Android中的应用

获取原文
获取原文并翻译 | 示例

摘要

Permission-based security models provide controlled access to various system resources. The expressiveness of the permission set plays an important role in providing the right level of granularity in access control. In this work, we present a methodology for the empirical analysis of permission-based security models which makes novel use of the Self-Organizing Map (SOM) algorithm of Kohonen (2001). While the proposed methodology may be applicable to a wide range of architectures, we analyze 1,100 Android applications as a case study. Our methodology is of independent interest for visualization of permission-based systems beyond our present Android-specific empirical analysis. We offer some discussion identifying potential points of improvement for the Android permission model, attempting to increase expressiveness where needed without increasing the total number of permissions or overall complexity.
机译:基于权限的安全模型提供对各种系统资源的受控访问。权限集的表达在访问控制中提供正确的粒度级别方面起着重要作用。在这项工作中,我们提出了一种基于权限的安全模型的经验分析方法,该方法新颖地利用了Kohonen(2001)的自组织映射(SOM)算法。虽然建议的方法可能适用于多种体系结构,但我们以案例研究为基础分析了1,100个Android应用程序。除了我们目前针对Android的经验分析之外,我们的方法对于基于权限的系统的可视化具有独立的兴趣。我们提供了一些讨论,以确定Android权限模型的潜在改进点,试图在不增加权限总数或整体复杂性的情况下,在需要的地方提高表达能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号