Filters








1,151 Hits in 4.2 sec

An Empirical Assessment of Security Risks of Global Android Banking Apps [article]

Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu
2020 arXiv   pre-print
Given huge potential financial loss caused by vulnerabilities, existing research lacks a comprehensive empirical study on the security risks of global banking apps to provide useful insights and improve  ...  the security of banking apps.  ...  This work is partially supported by the National Satellite of Excellence in Trustworthy Software System (Award No.  ... 
arXiv:1805.05236v5 fatcat:jfky26xmg5f2raijiddda6ouhe

An investigation study for risk calculation of security vulnerabilities on android applications

Radhwan M. Abdullah, Abedallah Zaid Abualkishik, Najla Matti Isaacc, Ali A. Alwan, Yonis Gulzar
2022 Indonesian Journal of Electrical Engineering and Computer Science  
In this review, we discuss the risk calculation of android applications which is used to determine the overall security of an application.  ...  The study also focuses on examining the predictive analysis of security risks using machine learning.  ...  ACKNOWLEDGMENT The authors are very grateful to the University of Mosul/College of Agriculture and Forestry for their provided facilities, which helped to improve the quality of this work.  ... 
doi:10.11591/ijeecs.v25.i3.pp1736-1748 fatcat:2bwar445ozgvhepykjsh4vhjay

Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps [article]

Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, Imran Chowdhury, Rahat Masood, Suranga Seneviratne
2020 arXiv   pre-print
Third-party security apps are an integral part of the Android app ecosystem. Many users install them as an extra layer of protection for their devices.  ...  To this end, in this paper, we present the first empirical study of Android security apps.  ...  The permissions requested by an app usually can give an understanding of the features of the app as well as any associated privacy and security risks.  ... 
arXiv:2007.03905v1 fatcat:3xbzu2qqgrcmrm2gtmpym7s4zq

The Predicting and Prevention of Malware from Cyber Hacking Breaches in Online Social Network

Dr. C. K. Gomathy
2021 International Journal for Research in Applied Science and Engineering Technology  
Abstract: Analyzing cyber incident information units is an essential approach for deepening our information of the evolution of the risk situation.  ...  This prototype detects and efficaciously blocks greater than 96% of malicious apps, which come from 3 massive datasets with approximately 2,800 apps, through exploiting the cooperation of parallel classifiers  ...  Apart from those advert hoc safety solutions, in an try to restriction the set of (dangerous) operations that an app can perform, Android has added its local safety mechanisms withinside the shape of permissions  ... 
doi:10.22214/ijraset.2021.38780 fatcat:2iidt7a5tna2nd7d2tkrjbeeua

Android Security: A Survey of Issues, Malware Penetration, and Defenses

Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan
2015 IEEE Communications Surveys and Tutorials  
This is the accepted version of the paper. This version of the publication may differ from the final published version.  ...  Process Fig. 8 : 8 Features of Androguard2) Risk Indicator: Risk Indicator calculates fuzzy risk score of an APK from 0 (low risk) to 100 (high risk).  ...  App-security assessment solutions try to find out vulnerabilities in apps, which if exploited by an adversary, can harm the user and device security.  ... 
doi:10.1109/comst.2014.2386139 fatcat:dkweaqhfo5dtpnii7xpgui4pgu

Influencing User's Behavior Concerning Android Privacy Policy: An Overview

Ming Di, Shah Nazir, Fucheng Deng, Sikandar Ali
2021 Mobile Information Systems  
Reusable resources are available in the form of third-party libraries, which are broadly active in android apps. It provides a diversity of functions that deliver privacy and security concerns.  ...  Such data and information carry considerable security and privacy risks. Users are usually unaware of how the data can be managed and used.  ...  Research work presented some of the security concerns addressed by the Android security architecture and reverse engineering of an Android banking app and static analysis of its code to identify flaws  ... 
doi:10.1155/2021/3452700 fatcat:kojuiqdcgvezvgomn4zbf5ffba

HEFESTDROID: Highly Effective Features for Android Malware Detection and Analysis

Shafiu Musa Et.al
2021 Turkish Journal of Computer and Mathematics Education  
The selection is based on the capabilities of the features in depicting the behaviors of android apps.  ...  2019, according to a report of global stats counter.  ...  According to the Kaspersky security bulletin 2018, 830,135 malwares capable of stealing money via online banking on android devices were blocked.  ... 
doi:10.17762/turcomat.v12i3.1884 fatcat:j76msctpwzeh5lwpysxaj7ckvq

Security Smells in Android

Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz
2017 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)  
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important.  ...  Moreover, we develop a lightweight static analysis tool and discuss the extent to which it successfully detects several vulnerabilities in about 46,000 apps hosted by the official Android market.  ...  EMPIRICAL STUDY We developed a lightweight analysis tool that statically detects known security smells in an app.  ... 
doi:10.1109/scam.2017.24 dblp:conf/scam/GhafariGN17 fatcat:jp7ru6x4xzcjhm33w2bebl6vs4

CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis [article]

Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma
2021 arXiv   pre-print
Our empirical study on over 40,000 apps as well as the analysis of popular apps reveals important security observations on the real threats of cryptographic misuses in Android apps.  ...  for assessing the overall risk of the app introduced by cryptographic misuses.  ...  Moreover, we try to make useful security observations based on an empirical study and the analysis of popular real-world apps.  ... 
arXiv:2112.06146v1 fatcat:k3fviwzqkvdzlf47azv5nhidkm

Mobile Security: Threats and Best Practices

Paweł Weichbroth, Łukasz Łysik, Quanzhong Li
2020 Mobile Information Systems  
While recognizing the risks associated with physical and social factors, the majority of respondents declared the use of built-in methods to mitigate the negative impact of malicious software and social-engineering  ...  Therefore, future work will cover identifying and modeling users' perceptions of the security and usability of mobile applications.  ...  It was never made available through any app store, but only in a specific firmware image on a specific model of an inexpensive Android phone.  ... 
doi:10.1155/2020/8828078 fatcat:7m7tjbg7j5a3pn2hjwloyjnphi

A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis

Saket Acharya, Umashankar Rawat, Roheet Bhatnagar, Bharat Bhushan
2022 Security and Communication Networks  
Most of the researchers have focused on Android system security.  ...  The popularity and open-source nature of Android devices have resulted in a dramatic growth of Android malware.  ...  for inter-app ICC risk assessment. e authors conducted an empirical investigation on 7,251 apps from the Google Play store to determine which apps connect via ICC channels. e most critical types of Android  ... 
doi:10.1155/2022/7775917 fatcat:ux2eun5y4bbfxlqkc36glj2fxq

Beyond the virus: a first look at coronavirus-themed Android malware

Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu
2021 Empirical Software Engineering  
In this paper, we present the first systematic study of coronavirus-themed Android malware.  ...  apps) by the time of mid-November, 2020.  ...  Acknowledgements This work was supported by the National Natural Science Foundation of China (grant numbers 62072046 and 61702045) and Hong Kong RGC Projects (No. 152279/16E, CityU C1008-16G).  ... 
doi:10.1007/s10664-021-09974-4 pmid:34149303 pmcid:PMC8196937 fatcat:nbhdypizhnfiplmehxtbdyxvni

Rivalry, Market Structure and Innovation: The Case of Mobile Banking

Zhaozhao He
2015 Review of Industrial Organization  
(iPhone apps) prior to iPhone apps (Android apps) and the number of banks adopted both apps around the same time.  ...  Android apps.  ...  This table reports OLS estimates examining the impact of mobile app adoption on the performance of the 694 banks from 2008:Q3 to 2012:Q2, covering 10,868 bank-quarter observations.  ... 
doi:10.1007/s11151-015-9466-z fatcat:alvsjcd3qfcydpkhx56gmxgxz4

RiskMon

Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu
2014 Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14  
However, helping users understand security risks of mobile applications is still an ongoing challenge.  ...  We also discuss a proof-of-concept implementation of Risk-Mon as an extension of the Android mobile platform and provide both system evaluation and usability study of our methodology.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
doi:10.1145/2557547.2557549 dblp:conf/codaspy/JingAZH14 fatcat:qxxtiig345fnffsbotuyr5sghe

Global adversarial capability modeling

Jonathan Spring, Sarah Kern, Alec Summers
2015 2015 APWG Symposium on Electronic Crime Research (eCrime)  
Purpose: We propose a model of global capability advancement, the adversarial capability chain (ACC), to fit this need.  ...  The model enables cyber risk analysis to better understand the costs for an adversary to attack a system, which directly influences the cost to defend it.  ...  Carnegie Mellon® and CERT® are registered marks of Carnegie Mellon University. DM-0002036  ... 
doi:10.1109/ecrime.2015.7120797 dblp:conf/ecrime/SpringKS15 fatcat:zghpmhyhsveu5dnzggk66jpvde
« Previous Showing results 1 — 15 out of 1,151 results