Exfiltrating data from android devices

Q Do, B Martini, KKR Choo - Computers & Security, 2015 - Elsevier
Modern mobile devices have security capabilities built into the native operating system,
which are generally designed to ensure the security of personal or corporate data stored on …

Enhancing user privacy on android mobile devices via permissions removal

Q Do, B Martini, KKR Choo - 2014 47th Hawaii International …, 2014 - ieeexplore.ieee.org
Android mobile devices are becoming a popular alternative to computers. The rise in the
number of tasks performed on smartphones means sensitive information is stored on the …

Privacy‐preserving targeted mobile advertising: requirements, design and a prototype implementation

Y Liu, A Simpson - Software: Practice and Experience, 2016 - Wiley Online Library
With the continued proliferation of mobile devices, the collection of information associated
with such devices and their users—such as location, installed applications and cookies …

Spyware detection in android using hybridization of description analysis, permission mapping and interface analysis

P Kaur, S Sharma - Procedia Computer Science, 2015 - Elsevier
Among all available Mobile OS, Android is an ideal target for attackers due to its huge
popularity. Android provides open-source OS and also provides ability to install third party …

Enforcing file system permissions on android external storage: Android file system permissions (afp) prototype and owncloud

Q Do, B Martini, KKR Choo - … on Trust, Security and Privacy in …, 2014 - ieeexplore.ieee.org
Mobile devices are fast becoming critical information management tools often storing a
range of personal and corporate confidential data often synced from online and cloud based …

AndRev: Reverse engineering tool to extract permissions of Android mobile apps for analysis

M Patil, D Pramod - … Technologies: Proceedings of Third ICCNCT 2020, 2021 - Springer
One of the leading and the most popular operating system for smartphones and tablets is an
Android. Being an open-source platform has also become a prime target for the attackers as …

A Case for Enforcing {App-Specific} Constraints to Mobile Devices by Using Trust Leases

N Santos, NO Duarte, MB Costa… - 15th Workshop on Hot …, 2015 - usenix.org
In certain usage scenarios, mobile devices are required to operate in some constrained
manner. For example, when movies are being screened in movie theaters, all devices in the …

Enhancing security of Android & IOS by implementing need-based security (NBS)

MA Dar, J Parvez - 2014 International Conference on Control …, 2014 - ieeexplore.ieee.org
The most popular Smartphone platforms ie Android and iOS are equipped with the built-in
security features to safeguard their end users. Android, being an Open Source Mobile …

Towards Enhancing Security in Android Operating Systems–Android Permissions & User Unawareness

A Ngobeni, S Mhlongo - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
One of the security aspects of mobile operating systems is their ability to isolate applications.
However, the Android user-based permission model breaks this security feature. To address …

On the trade-off between privacy and utility in mobile services: A qualitative study

Y Liu, A Simpson - International Workshop on the Security of Industrial …, 2019 - Springer
While the widespread use of mobile services offers a variety of benefits to mobile users, it
also raises serious privacy concerns. We report the results of a user study that investigated …