[PDF][PDF] Enhancing security of linux-based android devices
AD Schmidt, HG Schmidt, J Clausen… - Proceedings of 15th …, 2008 - researchgate.net
Our daily lives become more and more dependent upon smartphones due to their increased
capabilities. Smartphones are used in various ways from payment systems to assisting the …
capabilities. Smartphones are used in various ways from payment systems to assisting the …
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora… - Empirical Software …, 2019 - Springer
The wide and rapid adoption of Android-based devices in the last years has motivated the
usage of Android apps to support a broad range of daily activities. In that sense, being the …
usage of Android apps to support a broad range of daily activities. In that sense, being the …
[PDF][PDF] Analysis of android vulnerabilities and modern exploitation techniques
H Shewale, S Patil, V Deshmukh… - ICTACT journal on …, 2014 - pdfs.semanticscholar.org
Android is an operating system based on the Linux kernel. It is the most widely used and
popular operating system among Smartphones and portable devices. Its programmable and …
popular operating system among Smartphones and portable devices. Its programmable and …
Vetting undesirable behaviors in android apps with permission use analysis
Android platform adopts permissions to protect sensitive resources from untrusted apps.
However, after permissions are granted by users at install time, apps could use these …
However, after permissions are granted by users at install time, apps could use these …
MalRadar: Demystifying android malware in the new era
Mobile malware detection has attracted massive research effort in our community. A reliable
and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …
and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …
An Android runtime security policy enforcement framework
Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile
application. The front-end service of Trojans is attractive enough to deceive mobile users …
application. The front-end service of Trojans is attractive enough to deceive mobile users …
Towards analyzing the input validation vulnerabilities associated with android system services
Although the input validation vulnerabilities play a critical role in web application security,
such vulnerabilities are so far largely neglected in the Android security research community …
such vulnerabilities are so far largely neglected in the Android security research community …
Juxtapp: A scalable system for detecting code reuse among android applications
Mobile application markets such as the Android Marketplace provide a centralized
showcase of applications that end users can purchase or download for free onto their mobile …
showcase of applications that end users can purchase or download for free onto their mobile …
Apex: extending android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …
allows developers to easily create applications and users to readily install them. However …
To update or not to update: Insights from a two-year study of android app evolution
VF Taylor, I Martinovic - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Although there are over 1,900,000 third-party Android apps in the Google Play Store, little is
understood about how their security and privacy characteristics, such as dangerous …
understood about how their security and privacy characteristics, such as dangerous …