Runtime verification meets android security

Andreas Bauer*, Jan Christoph Küster, Gil Vegliach

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Citations (Scopus)


    A dynamic security mechanism for Android-powered devices based on runtime verification is introduced, which lets users monitor the behaviour of installed applications. The general idea and a prototypical implementation are outlined, an application to real-world security threats shown, and the underlying logical foundations, relating to the employed specification formalism, sketched.

    Original languageEnglish
    Title of host publicationNASA Formal Methods - 4th International Symposium, NFM 2012, Proceedings
    Number of pages7
    Publication statusPublished - 2012
    Event4th NASA Formal Methods Symposium, NFM 2012 - Norfolk, VA, United States
    Duration: 3 Apr 20125 Apr 2012

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume7226 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349


    Conference4th NASA Formal Methods Symposium, NFM 2012
    Country/TerritoryUnited States
    CityNorfolk, VA


    Dive into the research topics of 'Runtime verification meets android security'. Together they form a unique fingerprint.

    Cite this