skip to main content
research-article

EARP: Principled Storage, Sharing, and Protection for Mobile Apps

Published:05 January 2017Publication History
Skip Abstract Section

Abstract

Modern mobile apps communicate and exchange data with other apps almost as much as they communicate and exchange data with the operating system. Many popular apps now occupy essential places in the app "ecosystem" and provide other apps with services, such as storage, that have traditionally been the responsibility of the OS. For example, an app may rely on Facebook to authenticate users, Google Drive to store users' data, WhatsApp to send messages to other users, Twitter to publicly announce users' activities, etc.

References

  1. XU, YUANZHONG. Platform-level protection for interacting mobile apps. (PhD dissertation), University of Texas at Austin (August 2016).Google ScholarGoogle Scholar
  2. Google Drive API for Android: authorizing Android apps. https://developers.google.com/drive/android/auth. {Online; accessed 18- September-2015}.Google ScholarGoogle Scholar
  3. Google Drive API for iOS: authorizing requests of iOS apps. https://developers.google.com/drive/ ios/auth. {Online; accessed 18- September-2015}.Google ScholarGoogle Scholar
  4. SALTZER, J. H. Protection and the control of information sharing in multics. Communications of the ACM (CACM) 17, 7 (1974). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. SPAHN, R., BELL, J., LEE, M. Z., BHAMIDIPATI, S., GEAMBASU, R., AND KAISER, G. Pebbles: Fine-grained data management abstractions for modern operating systems. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. SUN, S.-T., AND BEZNOSOV, K. The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. In ACM Conference on Computer and Communications Security (CCS) (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. VIENNOT, N., GARCIA, E., AND NIEH, J. A measurement study of Google Play. In ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ZHOU, Y., AND JIANG, X. Detecting passive content leaks and pollution in Android applications. In Network and Distributed System Security Symposium (NDSS) (2013).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image GetMobile: Mobile Computing and Communications
    GetMobile: Mobile Computing and Communications  Volume 20, Issue 3
    July 2016
    42 pages
    ISSN:2375-0529
    EISSN:2375-0537
    DOI:10.1145/3036699
    Issue’s Table of Contents

    Copyright © 2017 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 5 January 2017

    Check for updates

    Qualifiers

    • research-article
  • Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader