Results 171 to 180 of about 95,083 (206)
Some of the next articles are maybe not open access.

A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and Privacy

Conference on Data and Application Security and Privacy
This paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform, which, due to its open nature and widespread adoption, is a fertile ground for cyber threats.
Joseph Guan Quan Lim   +6 more
semanticscholar   +1 more source

Privacy issues of android application permissions: A literature review

Transactions on Emerging Telecommunications Technologies, 2019
Android is an application platform for mobile devices. It comprises of the operating system, software framework, and core programs. This platform uses permissions to hide precious information about the user from untrusted apps.
Gulshan Shrivastava   +3 more
semanticscholar   +1 more source

(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices

ACM Asia Conference on Computer and Communications Security
In Android 12, Google introduced a new security feature called the privacy indicator to protect users from spyware. The privacy indicator visually alerts users by displaying a green circle in the notification bar when an application accesses the camera ...
Yurak Choe   +5 more
semanticscholar   +1 more source

Tabbed Out: Subverting the Android Custom Tab Security Model

IEEE Symposium on Security and Privacy
Mobile operating systems provide developers with various mobile-to-Web bridges to display Web pages inside native applications. A recently introduced component called Custom Tab (CT) provides an outstanding feature to overcome the usability limitations ...
Philipp Beer   +3 more
semanticscholar   +1 more source

Efficient Evolutionary Fuzzing for Android Application Installation Process

International Conference on Software Quality, Reliability and Security, 2019
Source code analysis techniques used for automated software testing are insufficient to find security flaws in programs. Therefore, security researchers have been employing also fuzzing techniques for finding bugs and vulnerabilities in target programs ...
Veysel Hataş, Sevil Şen, John A. Clark
semanticscholar   +1 more source

An Android Application for School Bus Tracking and Student Monitoring System

International Conference on Computational Intelligence and Computing Research, 2018
The BUS TRACKING AND STUDENT MONITORING SYSTEM is a mobile application that ensure security to the students. The main objective of this application is to build a vehicle monitoring system for school children.
My Bus   +6 more
semanticscholar   +1 more source

Monitoring Home Security by Developing an IoT-Based Smart Home Automation System Controlled by Android App and Web

2025 International Conference on Quantum Photonics, Artificial Intelligence, and Networking (QPAIN)
Automation has become indispensable in modern applications due to its efficiency, speed, and utility. In smart home systems, IoT-driven solutions are particularly critical for addressing security challenges and optimizing user convenience.
Sajeeb Bhattacharjee   +4 more
semanticscholar   +1 more source

A Survey on Various Threats and Current State of Security in Android Platform

ACM Computing Surveys, 2019
The advent of the Android system has brought smartphone technology to the doorsteps of the masses. The latest technologies have made it affordable for every section of the society.
P. Bhat, Kamlesh Dutta
semanticscholar   +1 more source

Security Issues in Android Application Development and Plug-in for Android Studio to Support Secure Programming

International Conference on Future Data and Security Engineering, 2021
Anh-Duy Tran   +3 more
semanticscholar   +1 more source

Security Enhancement for ATM Machine Using Mobile Application and IoT Technology

2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)
Nowadays, ATMs are most commonly used to transact money. As a result, ATM fraud has become the most common problem in recent years. The primary reason for these types of operations is attacks against the 4-digit PIN (Personal Identification Number ...
D. Pradeep   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy