The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang… - 31st USENIX Security …, 2022 - usenix.org
Mobile applications (apps) often delegate their own functions to other parties, which makes them become a super ecosystem hosting these parties. Therefore, such mobile apps are …
Mobile applications are part of the everyday lives of billions of people, who often trust them with sensitive information. These users identify the currently focused app solely by its visual …
R Wang, L Xing, XF Wang, S Chen - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
With the progress in mobile computing, web services are increasingly delivered to their users through mobile apps, instead of web browsers. However, unlike the browser, which …
F Roesner, T Kohno - … USENIX Security Symposium (USENIX Security 13 …, 2013 - usenix.org
Web and smartphone applications commonly embed third-party user interfaces like advertisements and social media widgets. However, this capability comes with security …
X Zhang, A Ahlawat, W Du - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
Android uses a permission-based security model to restrict applications from accessing private data and privileged resources. However, the permissions are assigned at the …
As a key UI feature of Android, overlay enables one app to draw over other apps by creating an extra View layer on top of the host View. While greatly facilitating user interactions with …
WebView objects allow Android apps to render web content in the app context. More specifically, in Android hybrid apps (ie, those having both Android code and web code) the …
As a critical feature for enhancing user experience, cross-app URL invocation has been reported to cause unauthorized execution of app components. Although protection has …