Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Identity confusion in {WebView-based} mobile app-in-app ecosystems

L Zhang, Z Zhang, A Liu, Y Cao, X Zhang… - 31st USENIX Security …, 2022 - usenix.org
Mobile applications (apps) often delegate their own functions to other parties, which makes
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …

What the app is that? deception and countermeasures in the android user interface

A Bianchi, J Corbetta, L Invernizzi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Mobile applications are part of the everyday lives of billions of people, who often trust them
with sensitive information. These users identify the currently focused app solely by its visual …

Unauthorized origin crossing on mobile platforms: Threats and mitigation

R Wang, L Xing, XF Wang, S Chen - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
With the progress in mobile computing, web services are increasingly delivered to their
users through mobile apps, instead of web browsers. However, unlike the browser, which …

Securing embedded user interfaces: Android and beyond

F Roesner, T Kohno - … USENIX Security Symposium (USENIX Security 13 …, 2013 - usenix.org
Web and smartphone applications commonly embed third-party user interfaces like
advertisements and social media widgets. However, this capability comes with security …

Aframe: Isolating advertisements from mobile applications in android

X Zhang, A Ahlawat, W Du - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
Android uses a permission-based security model to restrict applications from accessing
private data and privileged resources. However, the permissions are assigned at the …

Understanding and detecting overlay-based android malware at market scales

Y Yan, Z Li, QA Chen, C Wilson, T Xu, E Zhai… - Proceedings of the 17th …, 2019 - dl.acm.org
As a key UI feature of Android, overlay enables one app to draw over other apps by creating
an extra View layer on top of the host View. While greatly facilitating user interactions with …

Vulnerabilities in Android webview objects: Still not the end!

MA El-Zawawy, E Losiouk, M Conti - Computers & Security, 2021 - Elsevier
WebView objects allow Android apps to render web content in the app context. More
specifically, in Android hybrid apps (ie, those having both Android code and web code) the …

Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews

T Li, X Wang, M Zha, K Chen, XF Wang, L Xing… - Proceedings of the …, 2017 - dl.acm.org
As a critical feature for enhancing user experience, cross-app URL invocation has been
reported to cause unauthorized execution of app components. Although protection has …