Security smells in android

M Ghafari, P Gadient… - 2017 IEEE 17th …, 2017 - ieeexplore.ieee.org
The ubiquity of smartphones, and their very broad capabilities and usage, make the security
of these devices tremendously important. Unfortunately, despite all progress in security and …

Smashed: Sniffing and manipulating android sensor data for offensive purposes

M Mohamed, B Shrestha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

The privacy flag observatory: A crowdsourcing tool for real time privacy threats evaluation

V Vlachos, YC Stamatiou, S Nikoletseas - Journal of Cybersecurity and …, 2023 - mdpi.com
Instilling good privacy practices to developers and users appears to be a difficult and
daunting task. The World Wide Web encompasses a panspermia of different technologies …

Security properties of virtual remotes and SPOOKing their violations

JDO Majors, E Barsallo Yi, A Maji, D Wu… - Proceedings of the …, 2023 - dl.acm.org
As Smart TV devices become more prevalent in our lives, it becomes increasingly important
to evaluate the security of these devices. In addition to a smart and connected ecosystem …

Android on pc: On the security of end-user android emulators

F Xu, S Shen, W Diao, Z Li, Y Chen, R Li… - Proceedings of the 2021 …, 2021 - dl.acm.org
Android emulators today are not only acting as a debugging tool for developers but also
serving the massive end-users. These end-user Android emulators have attracted millions of …

A risk-driven model to minimize the effects of human factors on smart devices

S Gupta, A Buriro, B Crispo - International Workshop on Emerging …, 2019 - Springer
Human errors exploitation could entail unfavorable consequences to smart device users.
Typically, smart devices provide multiple configurable features, eg, user authentication …

All about activity injection: threats, semantics, and detection

S Lee, S Hwang, S Ryu - 2017 32nd IEEE/ACM International …, 2017 - ieeexplore.ieee.org
Android supports seamless user experience by maintaining activities from different apps in
the same activity stack. While such close inter-app communication is essential in the Android …

Smashed: Sniffing and manipulating android sensor data

M Mohamed, B Shrestha, N Saxena - … of the Sixth ACM Conference on …, 2016 - dl.acm.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

The threat of screenshot-taking malware: analysis, detection and prevention

H Sbai - 2022 - ora.ox.ac.uk
Among the various types of spyware, screenloggers are distinguished by their ability to
capture screenshots. This gives them considerable nuisance capacity, giving rise to theft of …

All about activity injection: Threats, semantics, detection, and defense

S Hwang, S Lee, S Ryu - Software: Practice and Experience, 2020 - Wiley Online Library
Android supports seamless user experience by maintaining activities from different
applications (apps) in the same activity stack. Although such close inter‐app communication …