Privacy concerns for mobile app download: An elaboration likelihood model perspective

J Gu, YC Xu, H Xu, C Zhang, H Ling - Decision Support Systems, 2017 - Elsevier
In the mobile age, protecting users' information from privacy-invasive apps becomes
increasingly critical. To precaution users against possible privacy risks, a few Android app …

Andrubis--1,000,000 apps later: A view on current Android malware behaviors

M Lindorfer, M Neugschwandtner… - … on building analysis …, 2014 - ieeexplore.ieee.org
Android is the most popular smartphone operating system with a market share of 80%, but
as a consequence, also the platform most targeted by malware. To deal with the increasing …

[PDF][PDF] Intellidroid: a targeted input generator for the dynamic analysis of android malware.

MY Wong, D Lie - NDSS, 2016 - ndss-symposium.org
While dynamic malware analysis methods generally provide better precision than purely
static methods, they have the key drawback that they can only detect malicious behavior if it …

Privacy as part of the app decision-making process

PG Kelley, LF Cranor, N Sadeh - … of the SIGCHI conference on human …, 2013 - dl.acm.org
Smartphones have unprecedented access to sensitive personal information. While users
report having privacy concerns, they may not actively consider privacy while downloading …

Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis

M Lindorfer, M Neugschwandtner… - 2015 IEEE 39th annual …, 2015 - ieeexplore.ieee.org
Android dominates the smartphone operating system market and consequently has attracted
the attention of malware authors and researchers alike. Despite the considerable number of …

Android inter-app communication threats and detection techniques

S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shopping, paying bills, transferring money, instant messaging …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Android permissions remystified: A field study on contextual integrity

P Wijesekera, A Baokar, A Hosseini… - 24th USENIX Security …, 2015 - usenix.org
We instrumented the Android platform to collect data regarding how often and under what
circumstances smartphone applications access protected resources regulated by …

Sok: Lessons learned from android security research for appified software platforms

Y Acar, M Backes, S Bugiel, S Fahl… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Android security and privacy research has boomed in recent years, far outstripping
investigations of other appified platforms. However, despite this attention, research efforts …

[PDF][PDF] A Survey of Android Security Threats and Defenses.

B Rashidi, CJ Fung - J. Wirel. Mob. Networks Ubiquitous Comput …, 2015 - isyou.info
With billions of people using smartphones and the exponential growth of smartphone apps,
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …