Conference item
GARMDROID: IoT potential security threats analysis through the inference of android applications hardware features requirements
- Abstract:
- Applications and services based on the Internet of Things (IoT) are increasingly vulnerable to disruption from attack or information theft. Developers and researchers attempt to prevent the growth of such disruption models, mitigate and limit their impact. Meeting these challenges requires understanding the characteristics of things and the technologies that empower the IoT since traditional protection mechanisms are not enough. Moreover, as the growth in mobile device market is pushing the deployment of the IoT, tools and mechanisms to evaluate, analyze and detect security threats in these devices are strongly required. In this context, this paper presents a web tool, named GARMDROID, aimed to help IoT software developers and integrators to evaluate IoT security threats based on the visualization of Android application hardware requests. This procedure is based on the static analysis of permissions requested by Android applications.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 1.3MB, Terms of use)
-
- Publisher copy:
- 10.1007/978-3-319-49622-1_8
Authors
- Publisher:
- Springer, Cham
- Host title:
- Applications for Future Internet
- Journal:
- Applications for Future Internet More from this journal
- Volume:
- 179
- Pages:
- 63-74
- Series:
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- Publication date:
- 2016-12-06
- DOI:
- ISSN:
-
1867-8211
- ISBN:
- 9783319496214
- Pubs id:
-
pubs:611147
- UUID:
-
uuid:5c36dd90-a218-45b3-9e82-36643b5d4e88
- Local pid:
-
pubs:611147
- Source identifiers:
-
611147
- Deposit date:
-
2016-04-15
Terms of use
- Copyright holder:
- ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- Copyright date:
- 2016
- Notes:
- © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017. This is the accepted manuscript version of the article. The final version is available online from Springer, Cham at: 10.1007/978-3-319-49622-1_8
If you are the owner of this record, you can report an update to it here: Report update to this record