Results 1 - 10
of
1,865
Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
"... Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized in different application marketplaces, can be ..."
Abstract
-
Cited by 54 (0 self)
- Add to MetaCart
regional or localization needs). To maintain and foster a hygienic smartphone app ecosystem, there is a need for each third-party marketplace to offer quality apps to mobile users. In this paper, we perform a systematic study on six popular Android-based third-party marketplaces. Among them, we find
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
, 2010
"... Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can simultaneous ..."
Abstract
-
Cited by 498 (23 self)
- Add to MetaCart
Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can
Sweetening Android Lemon Markets: Measuring and Combating Malware in Application Marketplaces
, 2013
"... Application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application marketplaces require applications to be cryptographically signed by their developers ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
by their developers, in Android marketplaces, self-signed certificates are common, thereby offering very limited authentication properties. As a result, there have been reports of malware being distributed through application “repackaging.” We provide a quantitative assessment of this phenomenon by collecting 41
These aren’t the droids you’re looking for: Retrofitting Android to protect data from imperious applications
- in Proc. 18th ACM Conference on Computer and Communication Security (CCS ’11). ACM
, 2011
"... In order to install an Android application, users are commonly re-quired to grant these application both the permission to access in-formation on the device, some of which users may consider private, as well as access the network, which could be used to leak this in-formation. We present two privacy ..."
Abstract
-
Cited by 165 (5 self)
- Add to MetaCart
-trols on 50 applications from the Android marketplace, selected from those that were both popular and permission-hungry. We find that our privacy controls can successfully reduce the effective per-missions of the application without causing side effects for 66% of the tested applications. The remaining 34
Measuring and Curbing Malware in Application Marketplaces
, 2012
"... Application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application marketplaces require applications to be cryptographically signed by their developers ..."
Abstract
- Add to MetaCart
by their developers, in Android marketplaces, self-signed certificates are common, thereby offering very limited authentication properties. As a result, there have been reports of malware being distributed through application “repackaging.” We provide a quantitative assessment of this phenomenon by collecting 41
Semantically Rich Application-Centric Security in Android
- In ACSAC ’09: Annual Computer Security Applications Conference
, 2009
"... Abstract—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this pape ..."
Abstract
-
Cited by 120 (7 self)
- Add to MetaCart
. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use
Paranoid android: Versatile protection for smartphones
- In ACSAC
, 2010
"... Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PCoriented solutions are not always applicable, or do not offer comprehe ..."
Abstract
-
Cited by 83 (6 self)
- Add to MetaCart
implemented a prototype of this security model for Android phones, and show that it is both practical and scalable: we generate no more than 2KiB/s and 64B/s of trace data for high-loads and idle operation respectively, and are able to support more than a hundred replicas running on a single server.
Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications
"... Abstract. Mobile application markets such as the Android Marketplace and the Amazon Android store provide a centralized showcase of applications that end users can purchase or download for free onto their mobile phones. Despite the influx of applications to the markets, applications are either large ..."
Abstract
-
Cited by 25 (1 self)
- Add to MetaCart
Abstract. Mobile application markets such as the Android Marketplace and the Amazon Android store provide a centralized showcase of applications that end users can purchase or download for free onto their mobile phones. Despite the influx of applications to the markets, applications are either
Crowdroid: Behavior-Based Malware Detection System for Android
"... The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue. In this paper we capitalize on earlier approaches for dynamic analysis of application behavior as a means f ..."
Abstract
-
Cited by 78 (0 self)
- Add to MetaCart
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue. In this paper we capitalize on earlier approaches for dynamic analysis of application behavior as a means
Contextual Android Education
, 2010
"... With advances in mobile phone hardware, the demand for mobile applica-tions has risen drastically. This has resulted in mobile phones becoming a pop-ular new medium for application development. However, the body of knowledge for contextual examples and tutorials leaves much to be desired. As of Janu ..."
Abstract
- Add to MetaCart
difficult computer science topics. As a corollary, the class hopes to foster and encourage a sense of inde-pendence and entrepreneurship through having students design, implement, and publish their own applications to the Android Application Marketplace. The main contribution of this thesis project comes
Results 1 - 10
of
1,865