Are we aware? an empirical study on the privacy and security awareness of smartphone sensors

AI Champa, MF Rabbi, FZ Eishita… - 2023 IEEE/ACIS 21st …, 2023 - ieeexplore.ieee.org
Smartphones are equipped with a wide variety of sensors, which can pose significant
security and privacy risks if not properly protected. To assess the privacy and security risks of …

The influence of transparency and control on the willingness of data sharing in adaptive mobile apps

F Bemmann, M Windl, J Erbe, S Mayer… - Proceedings of the ACM …, 2022 - dl.acm.org
Today, adaptive mobile applications use mobile sensing and user tracking, allowing for
adaptation to the users' context and needs. This raises several privacy concerns. Privacy …

LimonDroid: a system coupling three signature-based schemes for profiling Android malware

F Tchakounté, RCN Ngassi, VC Kamla… - Iran Journal of Computer …, 2021 - Springer
Android remains an interesting target to attackers due to its openness. A contribution in the
literature consists of providing similarity measurement such as fuzzy hashing to fight against …

[PDF][PDF] Permission-based malware detection mechanisms on android: analysis and perspectives

F Tchakounté - Journal of Computer Science, 2014 - researchgate.net
Android security has been built upon a permission-based mechanism which restricts
accesses of third-party Android applications to critical resources on an Android device. The …

An empirical study on secure usage of mobile health apps: The attack simulation approach

B Aljedaani, A Ahmad, M Zahedi, MA Babar - Information and Software …, 2023 - Elsevier
Context Mobile applications (apps) have proven their usefulness in enhancing service
provisioning across a multitude of domains that range from smart healthcare, to mobile …

Spyware detection in android using hybridization of description analysis, permission mapping and interface analysis

P Kaur, S Sharma - Procedia Computer Science, 2015 - Elsevier
Among all available Mobile OS, Android is an ideal target for attackers due to its huge
popularity. Android provides open-source OS and also provides ability to install third party …

HappyPerMi: Presenting critical data flows in mobile application to raise user security awareness

M Bahrini, N Wenig, M Meissner, K Sohr… - Extended Abstracts of …, 2019 - dl.acm.org
Malicious Android applications can obtain user's private data and silently send it to a server.
Android permissions are currently not sufficient enough to ensure the security of users' …

[引用][C] Android 安全研究进展

卿斯汉 - 软件学报, 2016

Assessing Mobile Application Privacy: A Quantitative Framework for Privacy Measurement

J Marono, C Silva, JP Barraca, V Cunha… - arXiv preprint arXiv …, 2023 - arxiv.org
The proliferation of mobile applications and the subsequent sharing of personal data with
service and application providers have given rise to substantial privacy concerns …

Security‐centric ranking algorithm and two privacy scores to mitigate intrusive apps

F Mohsen, H Abdelhaq, H Bisgin - … and Computation: Practice …, 2022 - Wiley Online Library
Smartphone users are constantly facing the risks of losing their private information to third‐
party mobile applications. Studies have revealed that the vast majority of users either do not …