iris: Vetting private api abuse in ios applications

Z Deng, B Saltaformaggio, X Zhang, D Xu - Proceedings of the 22nd …, 2015 - dl.acm.org
With the booming sale of iOS devices, the number of iOS applications has increased
significantly in recent years. To protect the security of iOS users, Apple requires every iOS …

Sok: Privacy on mobile devices–it's complicated

C Spensky, J Stewart, A Yerukhimovich… - Proceedings on …, 2016 - petsymposium.org
Modern mobile devices place a wide variety of sensors and services within the personal
space of their users. As a result, these devices are capable of transparently monitoring many …

{iHunter}: Hunting Privacy Violations at Scale in the Software Supply Chain on {iOS}

D Liu, Y Xiao, C Zhang, K Xie, X Bai, S Zhang… - 33rd USENIX Security …, 2024 - usenix.org
Privacy violations and compliance issues in mobile apps are serious concerns for users,
developers, and regulators. With many off-the-shelf tools on Android, prior works extensively …

Swan: A static analysis framework for swift

D Tiganov, J Cho, K Ali, J Dolby - Proceedings of the 28th ACM Joint …, 2020 - dl.acm.org
Swift is an open-source programming language and Apple's recommended choice for app
development. Given the global widespread use of Apple devices, the ability to analyze Swift …

Large-scale analysis of pop-up scam on typosquatting urls

T Dam, LD Klausner, D Buhov… - Proceedings of the 14th …, 2019 - dl.acm.org
Today, many different types of scams can be found on the internet. Online criminals are
always finding new creative ways to trick internet users, be it in the form of lottery scams …

Automated binary analysis on ios: A case study on cryptographic misuse in ios applications

J Feichtner, D Missmann, R Spreitzer - … of the 11th ACM Conference on …, 2018 - dl.acm.org
A wide range of mobile applications for Apple's iOS platform process sensitive data and,
therefore, rely on protective mechanisms natively provided by the operating system. A wrong …

The traditional influence on increasing acceptance of commercial smartphone applications in specific regions of the arabic world

AA Bahaddad - Complexity, 2021 - Wiley Online Library
The consumer sector represents one of the key players in the diffusion of M‐commerce in
contemporary societies. Consumers' traditionalism has a significant impact in determining …

ChanDet: Detection model for potential channel of iOS applications

GM Zhou, M Duan, Q Xi, H Wu - Journal of Physics: Conference …, 2019 - iopscience.iop.org
Despite providing iOS the security, comfortable, powerful mobile operating system, Apple
has too many restrictions. Many users prefer to jailbreaking the iOS by using jailbreaking …

A conceptual framework for successful E-commerce smartphone applications: the context of GCC

A Bahaddad, R AlGhamdi, SM Buhari… - arXiv preprint arXiv …, 2019 - arxiv.org
Rapid expansion of online business has engulfed the GCC region. Such expansion causes
competition among business entities, causing the need to identify the factors that the …

Fulfilling Privacy and Security Compliance in Software Supply Chain

Y Xiao - 2024 - search.proquest.com
This dissertation addresses the critical issue of privacy compliance within the software
supply chain. Privacy violations and compliance issues in mobile apps are major concerns …