TY - GEN
T1 - GARMDROID
T2 - International Summit on Applications for Future Internet, AFI 2016
AU - Rodríguez-Mota, Abraham
AU - Escamilla-Ambrosio, Ponciano Jorge
AU - Happa, Jassim
AU - Aguirre-Anaya, Eleazar
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017.
PY - 2017
Y1 - 2017
N2 - Applications and services based on the Internet of Things (IoT) are increasingly vulnerable to disruption from attack or information theft. Developers and researchers attempt to prevent the growth of such disruption models, mitigate and limit their impact. Meeting these challenges requires understanding the characteristics of things and the technologies that empower the IoT since traditional protection mechanisms are not enough. Moreover, as the growth in mobile device market is pushing the deployment of the IoT, tools and mechanisms to evaluate, analyze and detect security threats in these devices are strongly required. In this context, this paper presents a web tool, named GARMDROID, aimed to help IoT software developers and integrators to evaluate IoT security threats based on the visualization of Android application hardware requests. This procedure is based on the static analysis of permissions requested by Android applications.
AB - Applications and services based on the Internet of Things (IoT) are increasingly vulnerable to disruption from attack or information theft. Developers and researchers attempt to prevent the growth of such disruption models, mitigate and limit their impact. Meeting these challenges requires understanding the characteristics of things and the technologies that empower the IoT since traditional protection mechanisms are not enough. Moreover, as the growth in mobile device market is pushing the deployment of the IoT, tools and mechanisms to evaluate, analyze and detect security threats in these devices are strongly required. In this context, this paper presents a web tool, named GARMDROID, aimed to help IoT software developers and integrators to evaluate IoT security threats based on the visualization of Android application hardware requests. This procedure is based on the static analysis of permissions requested by Android applications.
KW - Android
KW - Internet of Things
KW - Security threats
UR - http://www.scopus.com/inward/record.url?scp=85009813208&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-49622-1_8
DO - 10.1007/978-3-319-49622-1_8
M3 - Contribución a la conferencia
SN - 9783319496214
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 63
EP - 74
BT - Applications for Future Internet - International Summit, AFI 2016, Revised Selected Papers
A2 - Mayora, Oscar
A2 - Sucar, Enrique
A2 - de Cote, Enrique Muñoz
A2 - de Cote, Enrique Muñoz
PB - Springer Verlag
Y2 - 25 May 2016 through 28 May 2016
ER -