Using an Android mobile device

Using an Android mobile device

Cybersecurity researchers have identified a new vulnerability affecting Android mobile devices that results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. (Credit: Maxwell Guberman, Georgia Tech)

Additional Information


Institute for Information Security and Privacy, Research Horizons

Research, Computer Science/Information Technology and Security
android, malware, permissions, vulnerability, Cloak and Dagger
  • Created By: John Toon
  • Workflow Status: Draft
  • Created On: May 21, 2017 - 1:24pm
  • Last Updated: May 21, 2017 - 1:24pm