A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
An interactive approach to mobile app verification
2015
Proceedings of the 3rd International Workshop on Mobile Development Lifecycle - MobileDeLi 2015
We use abductive inference to minimize the instrumentation, and interact with the developer to ensure that only unreachable code is instrumented. ...
Our verification process successfully discharges 11 out of the 12 false positives in a corpus of 77 Android apps. ...
Conclusion We have described an approach for interacting with an auditor (or developer) to eliminate false positives in static analysis. ...
doi:10.1145/2846661.2846668
dblp:conf/oopsla/BastaniAA15a
fatcat:qvbwd4us6fgfdlueklhqvik6uy
TagCurate: crowdsourcing the verification of biomedical annotations to mobile users
2013
EMBnet journal
As an extension to the Semantic Assistants framework (Witte and Gitzinger, 2008) , the server-side component is implemented using the J2EE Servlet technology and provides a RESTful endpoint to interact ...
Through an interactive interface, users can view each annotation in the context of the sentence that they appear, in order to determine whether the annotation is correctly tagged. ...
doi:10.14806/ej.19.b.722
fatcat:3htyzo726bbynclkh7qnnen5va
A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps
2016
2016 IEEE Globecom Workshops (GC Wkshps)
Mobile users, provided with a smartphone, will be capable of ubiquitously connecting to service providers through their installed mobile applications. ...
Additionally, the protocol is compliant with the OAuth2 specification, which enables an easy integration in current mobile application implementations. ...
The mobile app redirects the browser to the AS, which then interacts with the user, and finally it redirects the browser back to the mobile app. ...
doi:10.1109/glocomw.2016.7848816
dblp:conf/globecom/SucasasMRR16
fatcat:455pjnlthrfxxa63naqjtz7qs4
Analysis of testing approaches to Android mobile application vulnerabilities
2019
Zenodo
Application Security, NIST 800- 163 Vetting the Security of Mobile application, National In-formation Assurance Partnership and Mobile application security verification standard. ...
For statistics, the test results were taken from an online store, two crypto exchanges and two crypto wallets. ...
security requirements for mobile apps, identifying appropriate tools for testing mobile apps and determining if a mobile app is acceptable for deployment on an organization's mobile devices. ...
doi:10.5281/zenodo.6560792
fatcat:ym7jeplvvncovcujmv6wbn4baq
Automated detection and mitigation of inter-application security vulnerabilities in Android (invited talk)
2014
Proceedings of the 2nd International Workshop on Software Development Lifecycle for Mobile - DeMobile 2014
permissions and potentially interacting with each other-to install simultaneously. ...
In this paper, we provide an overview of a novel approach for compositional analysis of Android inter-application vulnerabilities, entitled COVERT. ...
At the heart of our approach is a modular static analysis technique for Android apps, designed to enable incremental and automated verification of apps as they are installed, removed and updated on an ...
doi:10.1145/2661694.2661699
dblp:conf/sigsoft/MalekBS14
fatcat:44khibbonrecrao2cr3mu6vxgi
Performance Analysis of Spotify® for Android with Model-Based Testing
2017
Mobile Information Systems
To validate the approach, the paper presents an experimental study with the well-known Spotify app for Android, in which we detected some interesting behaviors. ...
MVE also includes monitoring and verification support to detect executions that do not fit the patterns. ...
MVE (Mobile Verification Engine) (tool and examples available at http://www.morse.uma.es/tools/mve), the current tool implementing this approach, is oriented to Android OS applications and has been validated ...
doi:10.1155/2017/2012696
fatcat:xntcrvlb3ve6jjn22xjutgk25m
Mobile Apps Prioritizing Privacy, Efficiency and Equity: A Decentralized Approach to COVID-19 Vaccination Coordination
[article]
2021
arXiv
pre-print
In this early draft, we describe a decentralized, app-based approach to COVID-19 vaccine distribution that facilitates zero knowledge verification, dynamic vaccine scheduling, continuous symptoms reporting ...
To ensure equity, our solution is developed to work with limited internet access as well. ...
ACKNOWLEDGMENTS We are grateful to Riyanka Roy Choudhury, CodeX Fellow, Stanford University, Adam Berrey, CEO of PathCheck Foundation, Dr. ...
arXiv:2102.09372v1
fatcat:popdd73qfvbwhd4c5ictgjktlu
QDroid: Mobile Application Quality Analyzer for App Market Curators
2016
Mobile Information Systems
Low quality mobile applications have damaged the user experience. However, in light of the number of applications, quality analysis is a daunting task. ...
For that reason, QDroid is proposed, an automated quality analyzer that detects the presence of crashes, excessive resource usage, and compatibility problems, without source codes and human involvement ...
To prove the proposed approach, QDroid was implemented on a popular mobile platform and 67 apps collected from an official app market. ...
doi:10.1155/2016/1740129
fatcat:6yop4devnbho3jh46vjmaodmum
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks
[chapter]
2013
Lecture Notes in Computer Science
The scenario involves a mobile app that gathers visitors' demographic details, preferences, and current location coordinates, and sends them to the park's sever for various analyses. ...
In this paper we focus on authentication and privacy aspects of an application scenario that utilizes mobile crowd sensing for the benefit of amusement park operators and their visitors. ...
Application Scenario Building upon the mobile app approach, we envision an application scenario, which is based on the mobile crowd sensing and would eliminate the drawbacks of the previously described ...
doi:10.1007/978-3-642-38033-4_13
fatcat:ciavrdmspzb37f2khxuiwzuaja
Testing the Usability and Accessibility of Smart TV Applications Using an Automated Model-based Approach
[article]
2020
arXiv
pre-print
In this paper, we propose an approach to test the usability of Smart TV apps based on the automated generation of a Smart TV user interaction model from an existing app by a specialized automated crawler ...
The findings from this model-based automated analysis approach can be used to optimize the user interface of a Smart TV app to increase its usability, accessibility, and quality. ...
or mobile app UI design. ...
arXiv:2004.01478v1
fatcat:ajfu6hwihbbapmplwlxb3uy7d4
An Evaluation of Behavioural Profiling on Mobile Devices
[chapter]
2014
Lecture Notes in Computer Science
An end-user trial was undertaken to assist in investigating the perceptions surrounding the concept of behavioural profiling techniquean approach that is conceptually associated with privacy concerns. ...
The challenge is in providing an effective solution to the trade-off between effective security and usability. ...
As the existing PIN and biometrics techniques are implemented as a point-of-entry approach on mobile devices, they will only serve to provide a one-off authentication decision where the time between an ...
doi:10.1007/978-3-319-07620-1_29
fatcat:alpv6xpxlrcjrcnwbmel7425yu
On-Demand Biometrics
2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16
On-demand biometrics thus replace passwords or temporary access codes found in two-step verification with the ease of use of biometrics. ...
We present the results of an interview study on the use of on-demand biometrics with a live login backend. ...
Unlike typical two-step verification, our approach does not require users to type in a code that is sent to their phone. ...
doi:10.1145/2858036.2858139
dblp:conf/chi/HolzB16
fatcat:c3yvvjqjm5azhb6j6hdxxtsn5m
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients
[article]
2020
arXiv
pre-print
We evaluate the present-day feasibility and deployability of this concept by developing a fully functional prototype, running a host of experimental tests on three different mobile devices, and by conducting ...
However, this is not true if the adversary gains control of the client and can therefore manipulate what the user sees and what is sent to the remote server. ...
To enable UI verification, IntegriScreen requires that the expected relative positions of all UI elements is known, and a specification of such positions is available to the mobile app after the client ...
arXiv:2011.13979v1
fatcat:eetpumq2fjblnadq2f7xh5js4i
COVID-19 Antibody Test / Vaccination Certification: There's an app for that
[article]
2020
arXiv
pre-print
Methods: We developed a prototype mobile phone app and requisite decentralized server architecture that facilitates instant verification of tamper-proof test results. ...
Results: Our mobile phone app and decentralized server architecture enable the mixture of verifiability and privacy in a manner derived from public/private key pairs and digital signatures, generalized ...
The mobile phone app also contains the hashing libraries. As the mobile phone app needs to communicate with a server, an active internet connection is necessary for HTTPS server calls. ...
arXiv:2004.07376v3
fatcat:yteg3wjtefhl7gihtfaweodpgm
A Comparison of Inter-Organizational Business Models of Mobile App Stores: There is more than Open vs. Closed
2011
Journal of Theoretical and Applied Electronic Commerce Research
The purpose of this paper is to analyze the competition among mobile app stores for smart mobile media devices. ...
Therefore, the business models of seven mobile app stores are analyzed with a special focus on Apple and Google. ...
Such an approach may support a strategy focused on becoming the largest app store provider. ...
doi:10.4067/s0718-18762011000200007
fatcat:rlq4g3kn25e2vdsny57upykkxq
« Previous
Showing results 1 — 15 out of 15,654 results