X Zhang, A Ahlawat, W Du - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
Android uses a permission-based security model to restrict applications from accessing private data and privileged resources. However, the permissions are assigned at the …
Third-party libraries are commonly used by app developers for alleviating the development efforts and for monetizing their apps. On Android, the host app and its third-party libraries …
Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy-and security-relevant parts of the …
Android, iOS, and Windows 8 are changing the application architecture of consumer operating systems. These new architectures required OS designers to rethink security and …
Google's Android platform includes a permission model that protects access to sensitive capabilities, such as Internet access, GPS use, and telephony. We have found that Android's …
Despite security advice in the official documentation and an extensive body of security research about vulnerabilities and exploits, many developers still fail to write secure Android …
A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is …
Android has become the most popular operating system for mobile devices, which makes it a prominent target for malicious software. The security concept of Android is based on app …
M Nauman, S Khan, X Zhang - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However …