The Community for Technology Leaders
2012 IEEE 28th International Conference on Data Engineering Workshops (2012)
Arlington, VA, USA USA
Apr. 1, 2012 to Apr. 5, 2012
ISBN: 978-1-4673-1640-8
pp: 251-254
Android applications are used in a variety of domains, including business, social, media, health, scientific, and even military. On one hand, enterprises can take advantage of the richness of Android applications to support their business needs. On the other hand, Android devices contain rich sensitive data -- e.g., GPS location, photos, calendar, contacts, email, and files -- which is critical to the enterprise and unauthorized access to this sensitive data can lead to serious security risks. In this paper, we describe the nature and sources of sensitive data, what malicious applications can do to the data, and possible enterprise solutions to secure the data and mitigate the security risks. The purpose of this paper is to raise employees' and enterprises' awareness and show that a suite of easy-to-implement measures can improve both employee and enterprise security.

X. Wei, L. Gomez, I. Neamtiu and M. Faloutsos, "Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?," 2012 IEEE 28th International Conference on Data Engineering Workshops(ICDEW), Arlington, VA, USA USA, 2012, pp. 251-254.
82 ms
(Ver 3.3 (11022016))