sendroid: Auditing sensor access in android system-wide

W Han, C Cao, H Chen, D Li, Z Fang… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Sensors are widely used in modern mobile devices (eg, smartphones, watches) and may
gather abundant information from environments as well as about users, eg, photos, sounds …

Smashed: Sniffing and manipulating android sensor data

M Mohamed, B Shrestha, N Saxena - … of the Sixth ACM Conference on …, 2016 - dl.acm.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

SafetyNOT: on the usage of the SafetyNet attestation API in Android

M Ibrahim, A Imran, A Bianchi - Proceedings of the 19th Annual …, 2021 - dl.acm.org
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …

Semadroid: A privacy-aware sensor management framework for smartphones

Z Xu, S Zhu - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
While mobile sensing applications are booming, the sensor management mechanisms in
current smartphone operating systems are left behind--they are incomprehensive and …

An Empirical Analysis of Hazardous Uses of Android Shared Storage

S Du, P Zhu, J Hua, Z Qian, Z Zhang… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Android shared storage is shared with all the applications (apps for short) and the user. It is
common to see that a large amount of apps store different kinds of files on it. It is well known …

Smashed: Sniffing and manipulating android sensor data for offensive purposes

M Mohamed, B Shrestha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

Cassandra: Towards a certifying app store for android

S Lortz, H Mantel, A Starostin, T Bähr… - Proceedings of the 4th …, 2014 - dl.acm.org
Modern mobile devices store and process an abundance of data. Although many users
consider some of this data as private, they do not yet obtain satisfactory support for …

Log:{It's} Big,{It's} Heavy,{It's} Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem

A Lyons, J Gamba, A Shawaga, J Reardon… - 32nd USENIX Security …, 2023 - usenix.org
Android offers a shared system that multiplexes all logged data from all system components,
including both the operating system and the console output of apps that run on it. A security …

Systematic audit of third-party android phones

M Mitchell, G Tian, Z Wang - Proceedings of the 4th ACM Conference on …, 2014 - dl.acm.org
Android has become the leading smartphone platform with hundreds of devices from various
manufacturers available on the market today. All these phones closely resemble each other …

A secure play store for android

F Shen - Proceedings of the 2013 companion publication for …, 2013 - dl.acm.org
As Android becomes popular, Android security acquires more and more attentions. This
paper proposes a new system design strategy for dissemination of high fidelity applications …