The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

3 Citations (Scopus)

Abstract

Security protocols like TLS often have a two-sided upgrade problem, it takes a long time to upgrade, as both the client and the server must be upgraded.
LanguageEnglish
Title of host publicationSecurity Protocols XXIII
Subtitle of host publication23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers
EditorsBruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson
Place of PublicationCham, Switzerland
PublisherSpringer
Pages139-144
Number of pages6
ISBN (Print) 9783319260952
DOIs
Publication statusPublished - 25 Nov 2015

Fingerprint

Application programming interfaces (API)
Interfaces (computer)
Servers
Network protocols

Keywords

  • security protocol
  • device analyzer
  • Java code
  • Android device
  • Java object

Cite this

Thomas, D. R. (2015). The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion). In B. Christianson, P. Švenda, V. Matyáš, J. Malcolm, F. Stajano, & J. Anderson (Eds.), Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers (pp. 139-144). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-26096-9_14
Thomas, Daniel R. / The lifetime of Android API vulnerabilities : case study on the JavaScript-to-Java interface (transcript of discussion). Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. editor / Bruce Christianson ; Petr Švenda ; Vashek Matyáš ; James Malcolm ; Frank Stajano ; Jonathan Anderson. Cham, Switzerland : Springer, 2015. pp. 139-144
@inproceedings{a7c0f638f5674924a0104142bae30db3,
title = "The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion)",
abstract = "Security protocols like TLS often have a two-sided upgrade problem, it takes a long time to upgrade, as both the client and the server must be upgraded.",
keywords = "security protocol, device analyzer, Java code, Android device, Java object",
author = "Thomas, {Daniel R.}",
year = "2015",
month = "11",
day = "25",
doi = "10.1007/978-3-319-26096-9_14",
language = "English",
isbn = "9783319260952",
pages = "139--144",
editor = "Bruce Christianson and Petr Švenda and Vashek Maty{\'a}š and James Malcolm and Frank Stajano and Jonathan Anderson",
booktitle = "Security Protocols XXIII",
publisher = "Springer",

}

Thomas, DR 2015, The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion). in B Christianson, P Švenda, V Matyáš, J Malcolm, F Stajano & J Anderson (eds), Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Springer, Cham, Switzerland, pp. 139-144. https://doi.org/10.1007/978-3-319-26096-9_14

The lifetime of Android API vulnerabilities : case study on the JavaScript-to-Java interface (transcript of discussion). / Thomas, Daniel R.

Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. ed. / Bruce Christianson; Petr Švenda; Vashek Matyáš; James Malcolm; Frank Stajano; Jonathan Anderson. Cham, Switzerland : Springer, 2015. p. 139-144.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

TY - GEN

T1 - The lifetime of Android API vulnerabilities

T2 - case study on the JavaScript-to-Java interface (transcript of discussion)

AU - Thomas, Daniel R.

PY - 2015/11/25

Y1 - 2015/11/25

N2 - Security protocols like TLS often have a two-sided upgrade problem, it takes a long time to upgrade, as both the client and the server must be upgraded.

AB - Security protocols like TLS often have a two-sided upgrade problem, it takes a long time to upgrade, as both the client and the server must be upgraded.

KW - security protocol

KW - device analyzer

KW - Java code

KW - Android device

KW - Java object

U2 - 10.1007/978-3-319-26096-9_14

DO - 10.1007/978-3-319-26096-9_14

M3 - Conference contribution book

SN - 9783319260952

SP - 139

EP - 144

BT - Security Protocols XXIII

A2 - Christianson, Bruce

A2 - Švenda, Petr

A2 - Matyáš, Vashek

A2 - Malcolm, James

A2 - Stajano, Frank

A2 - Anderson, Jonathan

PB - Springer

CY - Cham, Switzerland

ER -

Thomas DR. The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion). In Christianson B, Švenda P, Matyáš V, Malcolm J, Stajano F, Anderson J, editors, Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Cham, Switzerland: Springer. 2015. p. 139-144 https://doi.org/10.1007/978-3-319-26096-9_14