Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

EARP: Principled Storage, Sharing, and Protection for Mobile Apps

Published: 05 January 2017 Publication History

Abstract

Modern mobile apps communicate and exchange data with other apps almost as much as they communicate and exchange data with the operating system. Many popular apps now occupy essential places in the app "ecosystem" and provide other apps with services, such as storage, that have traditionally been the responsibility of the OS. For example, an app may rely on Facebook to authenticate users, Google Drive to store users' data, WhatsApp to send messages to other users, Twitter to publicly announce users' activities, etc.

References

[1]
XU, YUANZHONG. Platform-level protection for interacting mobile apps. (PhD dissertation), University of Texas at Austin (August 2016).
[2]
Google Drive API for Android: authorizing Android apps. https://developers.google.com/drive/android/auth. {Online; accessed 18- September-2015}.
[3]
Google Drive API for iOS: authorizing requests of iOS apps. https://developers.google.com/drive/ ios/auth. {Online; accessed 18- September-2015}.
[4]
SALTZER, J. H. Protection and the control of information sharing in multics. Communications of the ACM (CACM) 17, 7 (1974).
[5]
SPAHN, R., BELL, J., LEE, M. Z., BHAMIDIPATI, S., GEAMBASU, R., AND KAISER, G. Pebbles: Fine-grained data management abstractions for modern operating systems. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2014).
[6]
SUN, S.-T., AND BEZNOSOV, K. The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. In ACM Conference on Computer and Communications Security (CCS) (2012).
[7]
VIENNOT, N., GARCIA, E., AND NIEH, J. A measurement study of Google Play. In ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) (2014).
[8]
ZHOU, Y., AND JIANG, X. Detecting passive content leaks and pollution in Android applications. In Network and Distributed System Security Symposium (NDSS) (2013).

Recommendations

Comments

Information & Contributors

Information

Published In

cover image GetMobile: Mobile Computing and Communications
GetMobile: Mobile Computing and Communications  Volume 20, Issue 3
July 2016
42 pages
ISSN:2375-0529
EISSN:2375-0537
DOI:10.1145/3036699
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 January 2017
Published in SIGMOBILE-GETMOBILE Volume 20, Issue 3

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 91
    Total Downloads
  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media