Unravelling security issues of runtime permissions in android
E Alepis, C Patsakis - Journal of Hardware and Systems Security, 2019 - Springer
Mobile computing is conquering human-computer interaction and user Internet access over
the last years. At the same time, smartphone devices are equipped with an increasing …
the last years. At the same time, smartphone devices are equipped with an increasing …
Dina: Detecting hidden android inter-app communication in dynamic loaded code
Android inter-app communication (IAC) allows apps to request functionalities from other
apps, which has been extensively used to provide a better user experience. However, IAC …
apps, which has been extensively used to provide a better user experience. However, IAC …
Hey doc, is this normal?: Exploring android permissions in the post marshmallow era
E Alepis, C Patsakis - … Privacy, and Applied Cryptography Engineering: 7th …, 2017 - Springer
Billions of hand-held devices are used globally in daily basis. The main reasons for their
wide adoption can be considered the introduction of various sensors that have completely …
wide adoption can be considered the introduction of various sensors that have completely …
A model checking based proposal for mobile colluding attack detection
The application collusion attack is a new form of threat that is becoming widespread in
mobile environment. This technique requires that two or more apps cooperate in some way …
mobile environment. This technique requires that two or more apps cooperate in some way …
Blackmarket-driven collusion on online media: a survey
HS Dutta, T Chakraborty - ACM/IMS Transactions on Data Science (TDS …, 2022 - dl.acm.org
Online media platforms have enabled users to connect with individuals and organizations,
and share their thoughts. Other than connectivity, these platforms also serve multiple …
and share their thoughts. Other than connectivity, these platforms also serve multiple …
Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences
The Android platform is currently targeted by malicious writers, continuously focused on the
development of new types of attacks to extract sensitive and private information from our …
development of new types of attacks to extract sensitive and private information from our …
Detecting vulnerable android inter-app communication in dynamically loaded code
Java reflection and dynamic class loading (DCL) are effective features for enhancing the
functionalities of Android apps. However, these features can be abused by sophisticated …
functionalities of Android apps. However, these features can be abused by sophisticated …
Malicious collusion detection in mobile environment by means of model checking
Everyday born a new cyberattack and among these an emerging attack is represent by the
so-called colluding. The application collusion attack is a new form of threat that is becoming …
so-called colluding. The application collusion attack is a new form of threat that is becoming …
Colluding android apps detection via model checking
The application collusion attack is a new form of threat that is becoming widespread in
mobile environment. This technique requires that two or more apps cooperate in some way …
mobile environment. This technique requires that two or more apps cooperate in some way …
Detecting colluding inter-app communication in mobile environment
The increase in computing capabilities of mobile devices has, in the last few years, made
possible a plethora of complex operations performed from smartphones and tablets end …
possible a plethora of complex operations performed from smartphones and tablets end …