Demystifying hidden privacy settings in mobile apps

Y Chen, M Zha, N Zhang, D Xu, Q Zhao… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Mobile apps include privacy settings that allow their users to configure how their data should
be shared. These settings, however, are often hard to locate and hard to understand by the …

[PDF][PDF] Permission-based android malware detection using machine learning

S Seraj - 2023 - research.brighton.ac.uk
Mobile devices, particularly Android-based devices, have become essential to our daily
lives. However, this trend has also increased the number and sophistication of mobile …

Towards formal model-based analysis and testing of Android's security mechanisms

G Betarte, J Campo, M Cristiá… - 2017 XLIII Latin …, 2017 - ieeexplore.ieee.org
This article reports on our experiences in applying formal methods to verify the security
mechanisms of Android. We have developed a comprehensive formal specification of …

Automatic security verification of mobile app configurations

G Costa, A Merlo, L Verderame, A Armando - Future Generation Computer …, 2018 - Elsevier
The swift and continuous evolution of mobile devices is encouraging both private and public
organizations to adopt the Bring Your Own Device (BYOD) paradigm. As a matter of fact, the …

Examining permission patterns in android apps using kernel density estimation

MS Saleem, J Mišić, VB Mišić - 2020 international conference …, 2020 - ieeexplore.ieee.org
Effective detection of malware apps requires thorough knowledge of behavioral and
structural patterns of both benign and malware apps. In this paper, we focus on permissions …

Application Design for Food and Beverage Online Delivery System Based of Android Framework

A Manan, V Wiley, T Lucas - JUITA: Jurnal Informatika, 2019 - jurnalnasional.ump.ac.id
Providing good services and satisfaction to customer is main concern on online business. As
technology is developed rapidly, many online restaurants has sought user-friendly platform …

Semantics for Security Policy Enforcement on Android Applications with Practical Cases

M Ziadia, M Mejri, J Fattahi - … : Selected Papers from the 2nd EAI …, 2022 - Springer
As much as they have positioned Android among the most widely used operating systems,
Android applications have helped malware creators to break in and infect its devices. A long …

A formal approach for the verification of the permission-based security model of Android

C Luna, G Betarte, J Campo, C Sanz, M Cristiá… - CLEI electronic …, 2018 - clei.org
This article reports on our experiences in applying formal methods to verify the security
mechanisms of Android. We have developed a comprehensive formal specification of …

Assisting developers in preventing permissions related security issues in android applications

MEA Tebib, P André, OEK Aktouf, M Graa - Dependable Computing-EDCC …, 2021 - Springer
Permissions related attacks are a widespread security issue in Android environment.
Permissions misuse enables attackers to steal the application rights and perform malicious …

Investigating Android permissions and intents for malware detection

FI Abro - 2018 - openaccess.city.ac.uk
Today's smart phones are used for wider range of activities. This extended range of
functionalities has also seen the infiltration of new security threats. Android has been the …