How secure is your smartphone: An analysis of smartphone security mechanisms

S Khan, M Nauman, AT Othman… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
Smartphones are becoming more and more popular due to the increase in their processing
power, mobility aspect and personal nature. Android is one of the most popular and fully …

Oaws: Memory occlusion aware warp scheduling

B Wang, Y Zhu, W Yu - … of the 2016 International Conference on Parallel …, 2016 - dl.acm.org
We have closely examined GPU resource utilization when executing memory-intensive
benchmarks. Our detailed analysis of GPU global memory accesses reveals that divergent …

Towards a privacy-aware quantified self data management framework

B Thuraisingham, M Kantarcioglu, E Bertino… - Proceedings of the …, 2018 - dl.acm.org
Massive amounts of data are being collected, stored, and analyzed for various business and
marketing purposes. While such data analysis is critical for many applications, it could also …

Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities

M Conti, N Dragoni, S Gottardo - International Workshop on Security and …, 2013 - Springer
Recent studies have shown that a significant number of mobile applications, often handling
sensitive data such as bank accounts and login credentials, suffers from SSL vulnerabilities …

Probabilistic contract compliance for mobile applications

G Dini, F Martinelli, A Saracino… - … Reliability and Security, 2013 - ieeexplore.ieee.org
We propose PICARD (ProbabIlistic Contract on Android), a framework to generate
probabilistic contracts to detect repackaged applications for Android smart phones. A …

Detection of repackaged mobile applications through a collaborative approach

A Aldini, F Martinelli, A Saracino… - Concurrency and …, 2015 - Wiley Online Library
Repackaged applications are based on genuine applications, but they subtlety include
some modifications. In particular, trojanized applications are one of the most dangerous …

Smartphone security limitations: conflicting traditions

N Husted, H Saïdi, A Gehani - Proceedings of the 2011 Workshop on …, 2011 - dl.acm.org
Smartphones are becoming a dominant form of mobile computing in the United States, and
more slowly, the world. The smartphone, as a platform, blends a traditional general …

Practical context-aware permission control for hybrid mobile applications

K Singh - International Workshop on Recent Advances in …, 2013 - Springer
The rapid growth of mobile computing has resulted in the development of new programming
paradigms for quick and easy development of mobile applications. Hybrid frameworks, such …

Investigating user perception and comprehension of android permission models

A Peruma, J Palmerino, DE Krutz - … of the 5th International Conference on …, 2018 - dl.acm.org
Do you know the permissions your favorite apps use? You probably don't, and you aren't
alone. Everyone seemingly talks about how important app security and privacy is to them …

CASTRA: Seamless and unobtrusive authentication of users to diverse mobile services

DM Shila, K Srivastava - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
This paper presents context-aware security technology for responsive and adaptive
protection (CASTRA), an “always-on” context-aware authentication and access control …