Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps

Kanae Yoshida
Kanae Yoshida
Hironori Imai
Hironori Imai
Nana Serizawa
Nana Serizawa

COMPSAC, pp. 593-602, 2019.

Cited by: 0|Bibtex|Views9|DOI:https://doi.org/10.2197/ipsjjip.27.593
EI
Other Links: academic.microsoft.com|dblp.uni-trier.de

Abstract:

Android applications are digitally signed using developersu0027 signing keys. As each key is associated with a developer, it can be used to establish trust between applications published by the author (that is, apps signed with the same key are allowed to update themselves if package names are identical, or access each otheru0027s resourc...More

Code:

Data:

Your rating :
0

 

Tags
Comments