Privacy concerns for mobile app download: An elaboration likelihood model perspective
In the mobile age, protecting users' information from privacy-invasive apps becomes
increasingly critical. To precaution users against possible privacy risks, a few Android app …
increasingly critical. To precaution users against possible privacy risks, a few Android app …
Andrubis--1,000,000 apps later: A view on current Android malware behaviors
M Lindorfer, M Neugschwandtner… - … on building analysis …, 2014 - ieeexplore.ieee.org
Android is the most popular smartphone operating system with a market share of 80%, but
as a consequence, also the platform most targeted by malware. To deal with the increasing …
as a consequence, also the platform most targeted by malware. To deal with the increasing …
[PDF][PDF] Intellidroid: a targeted input generator for the dynamic analysis of android malware.
While dynamic malware analysis methods generally provide better precision than purely
static methods, they have the key drawback that they can only detect malicious behavior if it …
static methods, they have the key drawback that they can only detect malicious behavior if it …
Privacy as part of the app decision-making process
Smartphones have unprecedented access to sensitive personal information. While users
report having privacy concerns, they may not actively consider privacy while downloading …
report having privacy concerns, they may not actively consider privacy while downloading …
Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis
M Lindorfer, M Neugschwandtner… - 2015 IEEE 39th annual …, 2015 - ieeexplore.ieee.org
Android dominates the smartphone operating system market and consequently has attracted
the attention of malware authors and researchers alike. Despite the considerable number of …
the attention of malware authors and researchers alike. Despite the considerable number of …
Android inter-app communication threats and detection techniques
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shopping, paying bills, transferring money, instant messaging …
many routine tasks like shopping, paying bills, transferring money, instant messaging …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Android permissions remystified: A field study on contextual integrity
P Wijesekera, A Baokar, A Hosseini… - 24th USENIX Security …, 2015 - usenix.org
We instrumented the Android platform to collect data regarding how often and under what
circumstances smartphone applications access protected resources regulated by …
circumstances smartphone applications access protected resources regulated by …
Sok: Lessons learned from android security research for appified software platforms
Android security and privacy research has boomed in recent years, far outstripping
investigations of other appified platforms. However, despite this attention, research efforts …
investigations of other appified platforms. However, despite this attention, research efforts …
[PDF][PDF] A Survey of Android Security Threats and Defenses.
With billions of people using smartphones and the exponential growth of smartphone apps,
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …