Filters








15,654 Hits in 4.0 sec

An interactive approach to mobile app verification

Osbert Bastani, Saswat Anand, Alex Aiken
2015 Proceedings of the 3rd International Workshop on Mobile Development Lifecycle - MobileDeLi 2015  
We use abductive inference to minimize the instrumentation, and interact with the developer to ensure that only unreachable code is instrumented.  ...  Our verification process successfully discharges 11 out of the 12 false positives in a corpus of 77 Android apps.  ...  Conclusion We have described an approach for interacting with an auditor (or developer) to eliminate false positives in static analysis.  ... 
doi:10.1145/2846661.2846668 dblp:conf/oopsla/BastaniAA15a fatcat:qvbwd4us6fgfdlueklhqvik6uy

TagCurate: crowdsourcing the verification of biomedical annotations to mobile users

Bahar Sateli, Sebastien Luong, René Witte
2013 EMBnet journal  
As an extension to the Semantic Assistants framework (Witte and Gitzinger, 2008) , the server-side component is implemented using the J2EE Servlet technology and provides a RESTful endpoint to interact  ...  Through an interactive interface, users can view each annotation in the context of the sentence that they appear, in order to determine whether the annotation is correctly tagged.  ... 
doi:10.14806/ej.19.b.722 fatcat:3htyzo726bbynclkh7qnnen5va

A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps

Victor Sucasas, Georgios Mantas, Ayman Radwan, Jonathan Rodriguez
2016 2016 IEEE Globecom Workshops (GC Wkshps)  
Mobile users, provided with a smartphone, will be capable of ubiquitously connecting to service providers through their installed mobile applications.  ...  Additionally, the protocol is compliant with the OAuth2 specification, which enables an easy integration in current mobile application implementations.  ...  The mobile app redirects the browser to the AS, which then interacts with the user, and finally it redirects the browser back to the mobile app.  ... 
doi:10.1109/glocomw.2016.7848816 dblp:conf/globecom/SucasasMRR16 fatcat:455pjnlthrfxxa63naqjtz7qs4

Analysis of testing approaches to Android mobile application vulnerabilities

Mykhailo Antonishyn, Oleksii Misnik
2019 Zenodo  
Application Security, NIST 800- 163 Vetting the Security of Mobile application, National In-formation Assurance Partnership and Mobile application security verification standard.  ...  For statistics, the test results were taken from an online store, two crypto exchanges and two crypto wallets.  ...  security requirements for mobile apps, identifying appropriate tools for testing mobile apps and determining if a mobile app is acceptable for deployment on an organization's mobile devices.  ... 
doi:10.5281/zenodo.6560792 fatcat:ym7jeplvvncovcujmv6wbn4baq

Automated detection and mitigation of inter-application security vulnerabilities in Android (invited talk)

Sam Malek, Hamid Bagheri, Alireza Sadeghi
2014 Proceedings of the 2nd International Workshop on Software Development Lifecycle for Mobile - DeMobile 2014  
permissions and potentially interacting with each other-to install simultaneously.  ...  In this paper, we provide an overview of a novel approach for compositional analysis of Android inter-application vulnerabilities, entitled COVERT.  ...  At the heart of our approach is a modular static analysis technique for Android apps, designed to enable incremental and automated verification of apps as they are installed, removed and updated on an  ... 
doi:10.1145/2661694.2661699 dblp:conf/sigsoft/MalekBS14 fatcat:44khibbonrecrao2cr3mu6vxgi

Performance Analysis of Spotify® for Android with Model-Based Testing

Ana Rosario Espada, María del Mar Gallardo, Alberto Salmerón, Pedro Merino
2017 Mobile Information Systems  
To validate the approach, the paper presents an experimental study with the well-known Spotify app for Android, in which we detected some interesting behaviors.  ...  MVE also includes monitoring and verification support to detect executions that do not fit the patterns.  ...  MVE (Mobile Verification Engine) (tool and examples available at http://www.morse.uma.es/tools/mve), the current tool implementing this approach, is oriented to Android OS applications and has been validated  ... 
doi:10.1155/2017/2012696 fatcat:xntcrvlb3ve6jjn22xjutgk25m

Mobile Apps Prioritizing Privacy, Efficiency and Equity: A Decentralized Approach to COVID-19 Vaccination Coordination [article]

Joseph Bae, Rohan Sukumaran, Sheshank Shankar, Anshuman Sharma, Ishaan Singh, Haris Nazir, Colin Kang, Saurish Srivastava, Parth Patwa, Abhishek Singh, Priyanshi Katiyar, Vitor Pamplona (+1 others)
2021 arXiv   pre-print
In this early draft, we describe a decentralized, app-based approach to COVID-19 vaccine distribution that facilitates zero knowledge verification, dynamic vaccine scheduling, continuous symptoms reporting  ...  To ensure equity, our solution is developed to work with limited internet access as well.  ...  ACKNOWLEDGMENTS We are grateful to Riyanka Roy Choudhury, CodeX Fellow, Stanford University, Adam Berrey, CEO of PathCheck Foundation, Dr.  ... 
arXiv:2102.09372v1 fatcat:popdd73qfvbwhd4c5ictgjktlu

QDroid: Mobile Application Quality Analyzer for App Market Curators

Jemin Lee, Hyungshin Kim
2016 Mobile Information Systems  
Low quality mobile applications have damaged the user experience. However, in light of the number of applications, quality analysis is a daunting task.  ...  For that reason, QDroid is proposed, an automated quality analyzer that detects the presence of crashes, excessive resource usage, and compatibility problems, without source codes and human involvement  ...  To prove the proposed approach, QDroid was implemented on a popular mobile platform and 67 apps collected from an official app market.  ... 
doi:10.1155/2016/1740129 fatcat:6yop4devnbho3jh46vjmaodmum

Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks [chapter]

Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg
2013 Lecture Notes in Computer Science  
The scenario involves a mobile app that gathers visitors' demographic details, preferences, and current location coordinates, and sends them to the park's sever for various analyses.  ...  In this paper we focus on authentication and privacy aspects of an application scenario that utilizes mobile crowd sensing for the benefit of amusement park operators and their visitors.  ...  Application Scenario Building upon the mobile app approach, we envision an application scenario, which is based on the mobile crowd sensing and would eliminate the drawbacks of the previously described  ... 
doi:10.1007/978-3-642-38033-4_13 fatcat:ciavrdmspzb37f2khxuiwzuaja

Testing the Usability and Accessibility of Smart TV Applications Using an Automated Model-based Approach [article]

Miroslav Bures, Miroslav Macik, Bestoun S. Ahmed, Vaclav Rechtberger, Pavel Slavik
2020 arXiv   pre-print
In this paper, we propose an approach to test the usability of Smart TV apps based on the automated generation of a Smart TV user interaction model from an existing app by a specialized automated crawler  ...  The findings from this model-based automated analysis approach can be used to optimize the user interface of a Smart TV app to increase its usability, accessibility, and quality.  ...  or mobile app UI design.  ... 
arXiv:2004.01478v1 fatcat:ajfu6hwihbbapmplwlxb3uy7d4

An Evaluation of Behavioural Profiling on Mobile Devices [chapter]

Fudong Li, Ross Wheeler, Nathan Clarke
2014 Lecture Notes in Computer Science  
An end-user trial was undertaken to assist in investigating the perceptions surrounding the concept of behavioural profiling techniquean approach that is conceptually associated with privacy concerns.  ...  The challenge is in providing an effective solution to the trade-off between effective security and usability.  ...  As the existing PIN and biometrics techniques are implemented as a point-of-entry approach on mobile devices, they will only serve to provide a one-off authentication decision where the time between an  ... 
doi:10.1007/978-3-319-07620-1_29 fatcat:alpv6xpxlrcjrcnwbmel7425yu

On-Demand Biometrics

Christian Holz, Frank R. Bentley
2016 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16  
On-demand biometrics thus replace passwords or temporary access codes found in two-step verification with the ease of use of biometrics.  ...  We present the results of an interview study on the use of on-demand biometrics with a live login backend.  ...  Unlike typical two-step verification, our approach does not require users to type in a code that is sent to their phone.  ... 
doi:10.1145/2858036.2858139 dblp:conf/chi/HolzB16 fatcat:c3yvvjqjm5azhb6j6hdxxtsn5m

IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients [article]

Ivo Sluganovic and Enis Ulqinaku and Aritra Dhar and Daniele Lain and Srdjan Capkun and Ivan Martinovic
2020 arXiv   pre-print
We evaluate the present-day feasibility and deployability of this concept by developing a fully functional prototype, running a host of experimental tests on three different mobile devices, and by conducting  ...  However, this is not true if the adversary gains control of the client and can therefore manipulate what the user sees and what is sent to the remote server.  ...  To enable UI verification, IntegriScreen requires that the expected relative positions of all UI elements is known, and a specification of such positions is available to the mobile app after the client  ... 
arXiv:2011.13979v1 fatcat:eetpumq2fjblnadq2f7xh5js4i

COVID-19 Antibody Test / Vaccination Certification: There's an app for that [article]

Marc Eisenstadt, Manoharan Ramachandran, Niaz Chowdhury, Allan Third, John Domingue
2020 arXiv   pre-print
Methods: We developed a prototype mobile phone app and requisite decentralized server architecture that facilitates instant verification of tamper-proof test results.  ...  Results: Our mobile phone app and decentralized server architecture enable the mixture of verifiability and privacy in a manner derived from public/private key pairs and digital signatures, generalized  ...  The mobile phone app also contains the hashing libraries. As the mobile phone app needs to communicate with a server, an active internet connection is necessary for HTTPS server calls.  ... 
arXiv:2004.07376v3 fatcat:yteg3wjtefhl7gihtfaweodpgm

A Comparison of Inter-Organizational Business Models of Mobile App Stores: There is more than Open vs. Closed

Roland M. Müller, Björn Kijl, Josef K. J. Martens
2011 Journal of Theoretical and Applied Electronic Commerce Research  
The purpose of this paper is to analyze the competition among mobile app stores for smart mobile media devices.  ...  Therefore, the business models of seven mobile app stores are analyzed with a special focus on Apple and Google.  ...  Such an approach may support a strategy focused on becoming the largest app store provider.  ... 
doi:10.4067/s0718-18762011000200007 fatcat:rlq4g3kn25e2vdsny57upykkxq
« Previous Showing results 1 — 15 out of 15,654 results