J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to sensitive data and system resources. However, apps can circumvent the permission model …
The widespread use of Android-based smartphones made it an important target for malicious applications' developers. So, a large number of frameworks have been proposed …
Ransomware constitutes a significant threat to the Android operating system. It can either lock or encrypt the target devices, and victims are forced to pay ransoms to restore their data …
E Okoyomon, N Samarin… - … (ConPro 2019), in …, 2019 - dspace.networks.imdea.org
The dominant privacy framework of the information age relies on notions of “notice and consent.” That is, service providers will disclose, often through privacy policies, their data …
Obfuscation techniques modify an app's source (or machine) code in order to make it more difficult to analyze. This is typically applied to protect intellectual property in benign apps, or …
Android-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its …
The threats facing smartphones have become one of the most dangerous cyberspace threats; therefore, many solutions have been developed in the commercial or academic …
While string obfuscation is a common technique used by mobile developers to prevent reverse engineering of their apps, malware authors also often employ it to, for example …