Android Application Security

A Semantics and Context-Aware Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Android Application Security by Mu Zhang, Heng Yin, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mu Zhang, Heng Yin ISBN: 9783319478128
Publisher: Springer International Publishing Publication: November 16, 2016
Imprint: Springer Language: English
Author: Mu Zhang, Heng Yin
ISBN: 9783319478128
Publisher: Springer International Publishing
Publication: November 16, 2016
Imprint: Springer
Language: English

This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context–aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. 

The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and use it to reliably detect malware variants and zero-day malware. Next, they propose an automatic patch generation technique to detect and block dangerous information flow. A bytecode rewriting technique is used to confine privacy leakage. User-awareness, a key factor of security risks, is addressed by automatically translating security-related program semantics into natural language descriptions. Frequent behavior mining is used to discover and compress common semantics. As a result, the produced descriptions are security-sensitive, human-understandable and concise.

By covering the background, current threats, and future work in this field, the brief is suitable for both professionals in industry and advanced-level students working in mobile security and applications. It is valuable for researchers, as well.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context–aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. 

The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and use it to reliably detect malware variants and zero-day malware. Next, they propose an automatic patch generation technique to detect and block dangerous information flow. A bytecode rewriting technique is used to confine privacy leakage. User-awareness, a key factor of security risks, is addressed by automatically translating security-related program semantics into natural language descriptions. Frequent behavior mining is used to discover and compress common semantics. As a result, the produced descriptions are security-sensitive, human-understandable and concise.

By covering the background, current threats, and future work in this field, the brief is suitable for both professionals in industry and advanced-level students working in mobile security and applications. It is valuable for researchers, as well.

More books from Springer International Publishing

Cover of the book Fundamentals of Boundary-Layer Meteorology by Mu Zhang, Heng Yin
Cover of the book Communication and Bioethics at the End of Life by Mu Zhang, Heng Yin
Cover of the book Intelligent Information and Database Systems by Mu Zhang, Heng Yin
Cover of the book Artificial Intelligence by Mu Zhang, Heng Yin
Cover of the book Ethical and Secure Computing by Mu Zhang, Heng Yin
Cover of the book Bioactive Compounds from Extremophiles by Mu Zhang, Heng Yin
Cover of the book Supply Chain Finance and Blockchain Technology by Mu Zhang, Heng Yin
Cover of the book Alzheimer’s Disease II by Mu Zhang, Heng Yin
Cover of the book Organized Crime and Illicit Trade by Mu Zhang, Heng Yin
Cover of the book Sequences, Groups, and Number Theory by Mu Zhang, Heng Yin
Cover of the book Euro-Par 2016: Parallel Processing by Mu Zhang, Heng Yin
Cover of the book South Asian Rivers by Mu Zhang, Heng Yin
Cover of the book Value Creation in International Business by Mu Zhang, Heng Yin
Cover of the book ‘Children Out of Place’ and Human Rights by Mu Zhang, Heng Yin
Cover of the book Data Protection and Privacy: (In)visibilities and Infrastructures by Mu Zhang, Heng Yin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy