Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users
Although Android's permission system is intended to allow users to make informed decisions
about their privacy, it is often ineffective at conveying meaningful, useful information on how …
about their privacy, it is often ineffective at conveying meaningful, useful information on how …
Performance evaluation on permission-based detection for android malware
CY Huang, YT Tsai, CH Hsu - … and Applications-Volume 2: Proceedings of …, 2013 - Springer
It is a straightforward idea to detect a harmful mobile application based on the permissions it
requests. This study attempts to explore the possibility of detecting malicious applications in …
requests. This study attempts to explore the possibility of detecting malicious applications in …
Sok: Lessons learned from android security research for appified software platforms
Android security and privacy research has boomed in recent years, far outstripping
investigations of other appified platforms. However, despite this attention, research efforts …
investigations of other appified platforms. However, despite this attention, research efforts …
Security behaviors of smartphone users
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …
users in an affluent economy of the Middle East. Design/methodology/approach–A model …
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
Android is a fast evolving system, with new updates coming out one after another. These
updates often completely overhaul a running system, replacing and adding tens of …
updates often completely overhaul a running system, replacing and adding tens of …
L4Android: a generic operating system framework for secure smartphones
Smartphones became many people's primary means of communication. Emerging
applications such as Near Field Communication require new levels of security that cannot …
applications such as Near Field Communication require new levels of security that cannot …
Automatically securing permission-based software by reducing the attack surface: An application to android
In the permission-based security model (used eg in Android and Blackberry), applications
can be granted more permissions than they actually need, what we call a “permission gap” …
can be granted more permissions than they actually need, what we call a “permission gap” …
Android botnets: What urls are telling us
Botnets have traditionally been seen as a threat to personal computers; however, the recent
shift to mobile platforms resulted in a wave of new botnets. Due to its popularity, Android …
shift to mobile platforms resulted in a wave of new botnets. Due to its popularity, Android …
Action recognition via local descriptors and holistic features
X Sun, M Chen, A Hauptmann - 2009 IEEE computer society …, 2009 - ieeexplore.ieee.org
In this paper we propose a unified action recognition framework fusing local descriptors and
holistic features. The motivation is that the local descriptors and holistic features emphasize …
holistic features. The motivation is that the local descriptors and holistic features emphasize …