The dark side of perceptual manipulations in virtual reality

WJ Tseng, E Bonnail, M McGill, M Khamis… - Proceedings of the …, 2022 - dl.acm.org
“Virtual-Physical Perceptual Manipulations”(VPPMs) such as redirected walking and haptics
expand the user's capacity to interact with Virtual Reality (VR) beyond what would ordinarily …

DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network

AT Kabakus - Expert Systems with Applications, 2022 - Elsevier
Smartphones have become an integral part of our daily lives thanks to numerous reasons.
While benefitting from what they offer, it is critical to be aware of the existence of malware in …

SOMDROID: Android malware detection by artificial neural network trained using unsupervised learning

A Mahindru, AL Sangal - Evolutionary Intelligence, 2022 - Springer
Android has gained its popularity due to its open-source and number of freely available
apps in its official play store. Appropriate functioning of Android apps depends upon the …

Runtime permission issues in android apps: Taxonomy, practices, and ways forward

Y Wang, Y Wang, S Wang, Y Liu, C Xu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Android introduces a new permission model that allows apps to request permissions at
runtime rather than at the installation time since 6.0 (Marshmallow, API level 23). While this …

Permdroid: automatically testing permission-related behaviour of android applications

S Yang, Z Zeng, W Song - Proceedings of the 31st ACM SIGSOFT …, 2022 - dl.acm.org
The Android runtime permission model allows users to grant and revoke permissions at
runtime. To verify the robustness of apps, developers have to test the apps repeatedly under …

Deep-layer clustering to identify permission usage patterns of android app categories

Z Namrud, S Kpodjedo, A Bali, C Talhi - IEEE Access, 2022 - ieeexplore.ieee.org
With the increasing usage of smartphones in banks, medical services and m-commerce, and
the uploading of applications from unofficial sources, security has become a major concern …

Smartphone security and privacy–a gamified persuasive approach with protection motivation theory

A Ganesh, C Ndulue, R Orji - International Conference on Persuasive …, 2022 - Springer
Mobile phones have evolved from feature phones to smartphones with comparable power
as modern desktops. On the other hand, security and privacy have taken a toll and, users …

Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

M Deverashetti, K Ranjitha, KV Pradeepthi - Journal of Information Security …, 2022 - Elsevier
There have been many incidents in the past, where user's private information, health and
vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation …

Uncovering Intent based Leak of Sensitive Data in Android Framework

H Zhou, X Luo, H Wang, H Cai - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
To prevent unauthorized apps from retrieving the sensitive data, Android framework
enforces a permission based access control. However, it has long been known that, to …

[PDF][PDF] Uncovering cross-context inconsistent access control enforcement in android

H Zhou, H Wang, X Luo, T Chen, Y Zhou… - The 2022 Network and …, 2022 - par.nsf.gov
Due to the complexity resulted from the huge code base and the multi-context nature of
Android, inconsistent access control enforcement exists in Android, which can be exploited …