The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

3 Citations (Scopus)

Abstract

Security protocols like TLS often have a two-sided upgrade problem, it takes a long time to upgrade, as both the client and the server must be upgraded.
Original languageEnglish
Title of host publicationSecurity Protocols XXIII
Subtitle of host publication23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers
EditorsBruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson
Place of PublicationCham, Switzerland
PublisherSpringer
Pages139-144
Number of pages6
ISBN (Print) 9783319260952
DOIs
Publication statusPublished - 25 Nov 2015

    Fingerprint

Keywords

  • security protocol
  • device analyzer
  • Java code
  • Android device
  • Java object

Cite this

Thomas, D. R. (2015). The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion). In B. Christianson, P. Švenda, V. Matyáš, J. Malcolm, F. Stajano, & J. Anderson (Eds.), Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers (pp. 139-144). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-26096-9_14