Results 21 to 30 of about 86,113 (173)

Security Code Smells in Android ICC [PDF]

open access: yes, 2018
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick   +3 more
core   +2 more sources

A New Sensors-Based Covert Channel on Android

open access: yesThe Scientific World Journal, 2014
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security.
Ahmed Al-Haiqi   +2 more
doaj   +1 more source

Mobile Application Security Platforms Survey [PDF]

open access: yes, 2016
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar   +2 more
core   +1 more source

Quality Assessment Criteria for Mobile Health Apps: A Systematic Review

open access: yesWalailak Journal of Science and Technology, 2019
Summative evidences on the criteria for user assessment of health apps are still limited. In order to determine an assessment method for mobile health apps, rigorously appropriate criteria must be chosen.
Wilasinee HONGSANUN, Suppachai INSUK
doaj   +1 more source

Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]

open access: yes, 2017
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio   +3 more
core   +2 more sources

Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [PDF]

open access: yes, 2015
Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data.
A Sabelfeld   +10 more
core   +2 more sources

Design and Implementation of a Walking Stick Aid for Visually Challenged People

open access: yesSensors, 2019
Visually challenged people (VCPs) face many difficulties in their routine life. Usually, in many cases, they need to depend upon others, which makes them unconfident in an unfamiliar environment.
Nilima Sahoo   +2 more
doaj   +1 more source

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

open access: yes, 2017
Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an ...
Baokar, Arjun   +7 more
core   +1 more source

A COMPARATIVE STUDY OF PIPELINE-VALIDATED MACHINE LEARNING CLASSIFIERS FOR PERMISSION-BASED ANDROID MALWARE DETECTION

open access: yesBarekeng
The growing prevalence of Android malware distributed through third-party APK sideloading poses a significant security threat to users and developers. This study aims to evaluate the effectiveness of three machine learning algorithms—Logistic Regression
Arif Ridho Lubis   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy