Monitoring the Execution of Third-Party Software on Mobile Devices

(Extended Abstract)
  • Andrew Brown
  • Mark Ryan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5230)


The current security model for a third-party application running on a mobile device requires its user to trust that application’s vendor and whilst mechanisms exist to mediate this relationship, they cannot guarantee complete protection against the threats posed. This work introduces a security architecture that prevents a third-party application deviating from its intended behaviour, defending devices against previously unseen malware more effectively than existing security measures.


Mobile Device Policy Language Security Architecture Intended Behaviour Programme Language Design 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bauer, L., Ligatti, J., Walker, D.: Composing security policies with Polymer. In: PLDI 2005: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, New York, USA, pp. 305–314 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Andrew Brown
    • 1
  • Mark Ryan
    • 1
  1. 1.School of Computer ScienceUniversity of BirminghamUK

Personalised recommendations