Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Demystifying resource management risks in emerging mobile app-in-app ecosystems

H Lu, L Xing, Y Xiao, Y Zhang, X Liao… - Proceedings of the …, 2020 - dl.acm.org
App-in-app is a new and trending mobile computing paradigm in which native app-like
software modules, called sub-apps, are hosted by popular mobile apps such as Wechat …

Ethical software requirements from user reviews: A systematic literature review

A Sorathiya, G Ginde - arXiv preprint arXiv:2410.01833, 2024 - arxiv.org
Context: The growing focus on ethics within SE, primarily due to the significant reliance of
individuals' lives on software and the consequential social and ethical considerations that …

Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section

I Arkalakis, M Diamantaris, S Moustakas… - 33rd USENIX Security …, 2024 - usenix.org
Users' growing concerns about online privacy have led to increased platform support for
transparency and consent in the web and mobile ecosystems. To that end, Android recently …

Bringing balance to the force: Dynamic analysis of the android application framework

A Dawoud, S Bugiel - … to the force: dynamic analysis of …, 2021 - publications.cispa.saarland
Android's application framework plays a crucial part in protecting users' private data and the
system integrity. Consequently, it has been the target of various prior works that analyzed its …

[HTML][HTML] Android fragmentation in malware detection

L Nguyen-Vu, J Ahn, S Jung - Computers & Security, 2019 - Elsevier
Differences between Android versions affect not only application developers but also make
the task of securing Android harder, as it is not easy to keep track of updates. In this paper …

Security-oriented view of app behaviour using textual descriptions and user-granted permission requests

O Olukoya, L Mackenzie, I Omoronyia - Computers & Security, 2020 - Elsevier
One of the major Android security mechanisms for enforcing restrictions on the core facilities
of a device that an app can access is permission control. However, there is an enormous …

Cerberus: Query-driven scalable vulnerability detection in oauth service provider implementations

TA Rahat, Y Feng, Y Tian - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
OAuth protocols have been widely adopted to simplify user authentication and service
authorization for third-party applications. However, little effort has been devoted to …

Demystifying hidden sensitive operations in android apps

X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi… - ACM Transactions on …, 2023 - dl.acm.org
Security of Android devices is now paramount, given their wide adoption among consumers.
As researchers develop tools for statically or dynamically detecting suspicious apps …

Understanding worldwide private information collection on android

Y Shen, PA Vervier, G Stringhini - arXiv preprint arXiv:2102.12869, 2021 - arxiv.org
Mobile phones enable the collection of a wealth of private information, from unique
identifiers (eg, email addresses), to a user's location, to their text messages. This information …