Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Demystifying resource management risks in emerging mobile app-in-app ecosystems
App-in-app is a new and trending mobile computing paradigm in which native app-like
software modules, called sub-apps, are hosted by popular mobile apps such as Wechat …
software modules, called sub-apps, are hosted by popular mobile apps such as Wechat …
Ethical software requirements from user reviews: A systematic literature review
A Sorathiya, G Ginde - arXiv preprint arXiv:2410.01833, 2024 - arxiv.org
Context: The growing focus on ethics within SE, primarily due to the significant reliance of
individuals' lives on software and the consequential social and ethical considerations that …
individuals' lives on software and the consequential social and ethical considerations that …
Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section
I Arkalakis, M Diamantaris, S Moustakas… - 33rd USENIX Security …, 2024 - usenix.org
Users' growing concerns about online privacy have led to increased platform support for
transparency and consent in the web and mobile ecosystems. To that end, Android recently …
transparency and consent in the web and mobile ecosystems. To that end, Android recently …
Bringing balance to the force: Dynamic analysis of the android application framework
Android's application framework plays a crucial part in protecting users' private data and the
system integrity. Consequently, it has been the target of various prior works that analyzed its …
system integrity. Consequently, it has been the target of various prior works that analyzed its …
[HTML][HTML] Android fragmentation in malware detection
L Nguyen-Vu, J Ahn, S Jung - Computers & Security, 2019 - Elsevier
Differences between Android versions affect not only application developers but also make
the task of securing Android harder, as it is not easy to keep track of updates. In this paper …
the task of securing Android harder, as it is not easy to keep track of updates. In this paper …
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
One of the major Android security mechanisms for enforcing restrictions on the core facilities
of a device that an app can access is permission control. However, there is an enormous …
of a device that an app can access is permission control. However, there is an enormous …
Cerberus: Query-driven scalable vulnerability detection in oauth service provider implementations
OAuth protocols have been widely adopted to simplify user authentication and service
authorization for third-party applications. However, little effort has been devoted to …
authorization for third-party applications. However, little effort has been devoted to …
Demystifying hidden sensitive operations in android apps
Security of Android devices is now paramount, given their wide adoption among consumers.
As researchers develop tools for statically or dynamically detecting suspicious apps …
As researchers develop tools for statically or dynamically detecting suspicious apps …
Understanding worldwide private information collection on android
Mobile phones enable the collection of a wealth of private information, from unique
identifiers (eg, email addresses), to a user's location, to their text messages. This information …
identifiers (eg, email addresses), to a user's location, to their text messages. This information …