Demystifying Android's Scoped Storage Defense

被引:3
|
作者
Lee, Yu-Tsung [1 ]
Chen, Haining [2 ]
Jaeger, Trent [3 ]
机构
[1] Penn State Univ, State Coll, PA 16801 USA
[2] Google, Android Secur, Mountain View, CA 94043 USA
[3] Penn State Univ, Dept Comp Sci & Engn, State Coll, PA 16801 USA
基金
美国国家科学基金会;
关键词
Smart phones; Media; File systems; Monitoring; Access control; Secure storage; Peer-to-peer computing; Androids;
D O I
10.1109/MSEC.2021.3090564
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android recently introduced the scoped storage defense to better protect application use of shared external storage. This article examines the evolution of Android external storage defenses leading to scoped storage and assesses the impact of the scoped storage defense for limiting opportunities for exploitation.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 50 条
  • [41] Demystifying Meckel's diverticulum - a guide for the gastroenterologist
    Butler, Kimberley
    Peachey, Thomas
    Sidhu, Reena
    Tai, Foong Way David
    CURRENT OPINION IN GASTROENTEROLOGY, 2025, 41 (03) : 146 - 153
  • [42] Demystifying electric flux and Gauss's law
    McManus, Jeff
    PHYSICS TEACHER, 2017, 55 (04): : 252 - 253
  • [43] Demystifying power MOSFET's avalanche ruggedness
    Shah, Hemal
    Power Electronics Technology, 2012, 37 (12):
  • [44] SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
    Wu, Daoyuan
    Cheng, Yao
    Gao, Debin
    Li, Yingjiu
    Deng, Robert H.
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 299 - 306
  • [45] Android malware defense through a hybrid multi-modal approach
    Asmitha, K. A.
    Vinod, P.
    Rehiman, Rafidha K. A.
    Raveendran, Neeraj
    Conti, Mauro
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 233
  • [46] GEAAD: generating evasive adversarial attacks against android malware defense
    Naveed Ahmad
    Amjad Saleem Rana
    Hassan Jalil Hadi
    Faisal Bashir Hussain
    Prasun Chakrabarti
    Mohammed Ali Alshara
    Tulika Chakrabarti
    Scientific Reports, 15 (1)
  • [47] How to Block the Malicious Access to Android External Storage
    Yuan, Sisi
    Wang, Yuewu
    Wang, Pingjian
    Lei, Lingguang
    Zhou, Quan
    Li, Jun
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 287 - 303
  • [48] DROIT plus : Taint Tracking for Storage Access on Android
    Hsu, Chia-Wei
    Chang, Chia-Huei
    Wang, Chi-Wei
    Shieh, Shiuhpyng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (05) : 1237 - 1254
  • [49] Digital Forensic Investigation of Cloud Storage Client in Android
    Zhang, Huixiang
    Wang, Yanan
    Chen, Chunlei
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 583 - 587
  • [50] An Empirical Analysis of Hazardous Uses of Android Shared Storage
    Du, Shaoyong
    Zhu, Pengxiong
    Hua, Jingyu
    Qian, Zhiyun
    Zhang, Zhao
    Chen, Xiaoyu
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 340 - 355