• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,865
Next 10 →

Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces

by Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
"... Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized in different application marketplaces, can be ..."
Abstract - Cited by 54 (0 self) - Add to MetaCart
regional or localization needs). To maintain and foster a hygienic smartphone app ecosystem, there is a need for each third-party marketplace to offer quality apps to mobile users. In this paper, we perform a systematic study on six popular Android-based third-party marketplaces. Among them, we find

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

by William Enck, Landon P. Cox, Jaeyeon Jung, et al. , 2010
"... Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can simultaneous ..."
Abstract - Cited by 498 (23 self) - Add to MetaCart
Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can

Sweetening Android Lemon Markets: Measuring and Combating Malware in Application Marketplaces

by Timothy Vidas, et al. , 2013
"... Application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application marketplaces require applications to be cryptographically signed by their developers ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
by their developers, in Android marketplaces, self-signed certificates are common, thereby offering very limited authentication properties. As a result, there have been reports of malware being distributed through application “repackaging.” We provide a quantitative assessment of this phenomenon by collecting 41

These aren’t the droids you’re looking for: Retrofitting Android to protect data from imperious applications

by Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, David Wetherall - in Proc. 18th ACM Conference on Computer and Communication Security (CCS ’11). ACM , 2011
"... In order to install an Android application, users are commonly re-quired to grant these application both the permission to access in-formation on the device, some of which users may consider private, as well as access the network, which could be used to leak this in-formation. We present two privacy ..."
Abstract - Cited by 165 (5 self) - Add to MetaCart
-trols on 50 applications from the Android marketplace, selected from those that were both popular and permission-hungry. We find that our privacy controls can successfully reduce the effective per-missions of the application without causing side effects for 66% of the tested applications. The remaining 34

Measuring and Curbing Malware in Application Marketplaces

by Timothy Vidas, Nicolas Christin, Timothy Vidasa, Nicolas Christinb , 2012
"... Application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application marketplaces require applications to be cryptographically signed by their developers ..."
Abstract - Add to MetaCart
by their developers, in Android marketplaces, self-signed certificates are common, thereby offering very limited authentication properties. As a result, there have been reports of malware being distributed through application “repackaging.” We provide a quantitative assessment of this phenomenon by collecting 41

Semantically Rich Application-Centric Security in Android

by Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel - In ACSAC ’09: Annual Computer Security Applications Conference , 2009
"... Abstract—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this pape ..."
Abstract - Cited by 120 (7 self) - Add to MetaCart
. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use

Paranoid android: Versatile protection for smartphones

by Georgios Portokalidis, Philip Homburg, Herbert Bos, Kostas Anagnostakis - In ACSAC , 2010
"... Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PCoriented solutions are not always applicable, or do not offer comprehe ..."
Abstract - Cited by 83 (6 self) - Add to MetaCart
implemented a prototype of this security model for Android phones, and show that it is both practical and scalable: we generate no more than 2KiB/s and 64B/s of trace data for high-loads and idle operation respectively, and are able to support more than a hundred replicas running on a single server.

Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications

by Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen
"... Abstract. Mobile application markets such as the Android Marketplace and the Amazon Android store provide a centralized showcase of applications that end users can purchase or download for free onto their mobile phones. Despite the influx of applications to the markets, applications are either large ..."
Abstract - Cited by 25 (1 self) - Add to MetaCart
Abstract. Mobile application markets such as the Android Marketplace and the Amazon Android store provide a centralized showcase of applications that end users can purchase or download for free onto their mobile phones. Despite the influx of applications to the markets, applications are either

Crowdroid: Behavior-Based Malware Detection System for Android

by Iker Burguera, Urko Zurutuza, Simin Nadjm-tehrani
"... The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue. In this paper we capitalize on earlier approaches for dynamic analysis of application behavior as a means f ..."
Abstract - Cited by 78 (0 self) - Add to MetaCart
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue. In this paper we capitalize on earlier approaches for dynamic analysis of application behavior as a means

Contextual Android Education

by San Luis Obispo, James Reed, James Reed, James Reed , 2010
"... With advances in mobile phone hardware, the demand for mobile applica-tions has risen drastically. This has resulted in mobile phones becoming a pop-ular new medium for application development. However, the body of knowledge for contextual examples and tutorials leaves much to be desired. As of Janu ..."
Abstract - Add to MetaCart
difficult computer science topics. As a corollary, the class hopes to foster and encourage a sense of inde-pendence and entrepreneurship through having students design, implement, and publish their own applications to the Android Application Marketplace. The main contribution of this thesis project comes
Next 10 →
Results 1 - 10 of 1,865
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University