The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
Evolution, detection and analysis of malware for smart devices
G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …
Aff-wild: valence and arousal'In-the-Wild'challenge
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …
benchmark for assessing the performance of facial affect/behaviour analysis …
Madam: Effective and efficient behavior-based android malware detection and prevention
Android users are constantly threatened by an increasing number of malicious applications
(apps), generically called malware. Malware constitutes a serious threat to user privacy …
(apps), generically called malware. Malware constitutes a serious threat to user privacy …
An Exhibition of Hidden Stories: The Young Voices Soundscape-Examining Sound and Silence as a Collective Experience in Sound Art Installation
P Demetriou - HARTS & Minds, 2014 - research-information.bris.ac.uk
In this paper I explore the concepts of sound and silence focusing upon creative modalities
for the dissemination of oral history materials. In doing so I focus upon two sound …
for the dissemination of oral history materials. In doing so I focus upon two sound …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
Unsafe exposure analysis of mobile in-app advertisements
In recent years, there has been explosive growth in smartphone sales, which is
accompanied with the availability of a huge number of smartphone applications (or simply …
accompanied with the availability of a huge number of smartphone applications (or simply …
Aurasium: Practical policy enforcement for android applications
The increasing popularity of Google's mobile platform Android makes it the prime target of
the latest surge in mobile malware. Most research on enhancing the platform's security and …
the latest surge in mobile malware. Most research on enhancing the platform's security and …
[PDF][PDF] Security enhanced (se) android: bringing flexible mac to android.
S Smalley, R Craig - Ndss, 2013 - cs.columbia.edu
The Android software stack for mobile devices defines and enforces its own security model
for apps through its application-layer permissions model. However, at its foundation, Android …
for apps through its application-layer permissions model. However, at its foundation, Android …
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …