Results 21 to 30 of about 86,113 (173)
Security Code Smells in Android ICC [PDF]
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick +3 more
core +2 more sources
A New Sensors-Based Covert Channel on Android
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security.
Ahmed Al-Haiqi +2 more
doaj +1 more source
Mobile Application Security Platforms Survey [PDF]
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar +2 more
core +1 more source
Quality Assessment Criteria for Mobile Health Apps: A Systematic Review
Summative evidences on the criteria for user assessment of health apps are still limited. In order to determine an assessment method for mobile health apps, rigorously appropriate criteria must be chosen.
Wilasinee HONGSANUN, Suppachai INSUK
doaj +1 more source
Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio +3 more
core +2 more sources
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [PDF]
Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data.
A Sabelfeld +10 more
core +2 more sources
Design and Implementation of a Walking Stick Aid for Visually Challenged People
Visually challenged people (VCPs) face many difficulties in their routine life. Usually, in many cases, they need to depend upon others, which makes them unconfident in an unfamiliar environment.
Nilima Sahoo +2 more
doaj +1 more source
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai +9 more
core +2 more sources
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an ...
Baokar, Arjun +7 more
core +1 more source
The growing prevalence of Android malware distributed through third-party APK sideloading poses a significant security threat to users and developers. This study aims to evaluate the effectiveness of three machine learning algorithms—Logistic Regression
Arif Ridho Lubis +5 more
doaj +1 more source

