How secure is your smartphone: An analysis of smartphone security mechanisms
Smartphones are becoming more and more popular due to the increase in their processing
power, mobility aspect and personal nature. Android is one of the most popular and fully …
power, mobility aspect and personal nature. Android is one of the most popular and fully …
Oaws: Memory occlusion aware warp scheduling
We have closely examined GPU resource utilization when executing memory-intensive
benchmarks. Our detailed analysis of GPU global memory accesses reveals that divergent …
benchmarks. Our detailed analysis of GPU global memory accesses reveals that divergent …
Towards a privacy-aware quantified self data management framework
Massive amounts of data are being collected, stored, and analyzed for various business and
marketing purposes. While such data analysis is critical for many applications, it could also …
marketing purposes. While such data analysis is critical for many applications, it could also …
Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities
Recent studies have shown that a significant number of mobile applications, often handling
sensitive data such as bank accounts and login credentials, suffers from SSL vulnerabilities …
sensitive data such as bank accounts and login credentials, suffers from SSL vulnerabilities …
Probabilistic contract compliance for mobile applications
We propose PICARD (ProbabIlistic Contract on Android), a framework to generate
probabilistic contracts to detect repackaged applications for Android smart phones. A …
probabilistic contracts to detect repackaged applications for Android smart phones. A …
Detection of repackaged mobile applications through a collaborative approach
Repackaged applications are based on genuine applications, but they subtlety include
some modifications. In particular, trojanized applications are one of the most dangerous …
some modifications. In particular, trojanized applications are one of the most dangerous …
Smartphone security limitations: conflicting traditions
Smartphones are becoming a dominant form of mobile computing in the United States, and
more slowly, the world. The smartphone, as a platform, blends a traditional general …
more slowly, the world. The smartphone, as a platform, blends a traditional general …
Practical context-aware permission control for hybrid mobile applications
K Singh - International Workshop on Recent Advances in …, 2013 - Springer
The rapid growth of mobile computing has resulted in the development of new programming
paradigms for quick and easy development of mobile applications. Hybrid frameworks, such …
paradigms for quick and easy development of mobile applications. Hybrid frameworks, such …
Investigating user perception and comprehension of android permission models
Do you know the permissions your favorite apps use? You probably don't, and you aren't
alone. Everyone seemingly talks about how important app security and privacy is to them …
alone. Everyone seemingly talks about how important app security and privacy is to them …
CASTRA: Seamless and unobtrusive authentication of users to diverse mobile services
DM Shila, K Srivastava - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
This paper presents context-aware security technology for responsive and adaptive
protection (CASTRA), an “always-on” context-aware authentication and access control …
protection (CASTRA), an “always-on” context-aware authentication and access control …