Filters








3,251 Hits in 6.1 sec

Expectation and purpose

Jialiu Lin, Norman Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Joy Zhang
2012 Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12  
We report on the results of using crowdsourcing to capture users' expectations of what sensitive resources mobile apps use.  ...  Smartphone security research has produced many useful tools to analyze the privacy-related behaviors of mobile apps.  ...  Android Permissions The Android permission framework is intended to serve two purposes in protecting users: (1) to limit mobile apps' access to sensitive resources, and (2) to assist users in making trust  ... 
doi:10.1145/2370216.2370290 dblp:conf/huc/LinSALHZ12 fatcat:dlj3ncjqtnbn5mibjwazhou2mq

Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping [chapter]

Jacob Leon Kröger, Philip Raschke
2019 Lecture Notes in Computer Science  
Besides various other privacy concerns with mobile devices, many people suspect their smartphones to be secretly eavesdropping on them.  ...  Taking into account existing access control mechanisms, detection methods, and other technical aspects, we point out remaining vulnerabilities and research gaps.  ...  There are also many documented cases of mobile apps using their microphone access in unexpected ways.  ... 
doi:10.1007/978-3-030-22479-0_6 fatcat:v4bmsoiybnbspmwt4w2vhsimli

A Survey of Android Security Threats and Defenses

Bahman Rashidi, Carol J. Fung
2015 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
As a result, mobile users are left to decide for themselves whether an app is safe to use.  ...  use of mobile resources.  ...  In probation mode, at run time, an app has to request permission from users to access sensitive resources (e.g. GPS traces, contact information, friend list) when the resource is needed.  ... 
doi:10.22667/jowua.2015.09.31.003 dblp:journals/jowua/RashidiF15 fatcat:xapwtq76cvbsvcwlubtan5aqu4

Aware: Controlling App Access to I/O Devices on Mobile Platforms [article]

Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags and Trent Jaeger
2016 arXiv   pre-print
Contemporary mobile operating systems fail to prevent such misuse of I/O devices by authorized apps due to lack of binding between users' interactions and accesses to I/O devices performed by these apps  ...  In this paper, we propose Aware, a security framework for authorizing app requests to perform operations using I/O devices, which binds app requests with user intentions to make all uses of certain I/O  ...  On average, there are 8 requests per minute by processes running apps to request permission to access sensitive resources [36] . 10 The timer is used to support apps that require users to keep pressing  ... 
arXiv:1604.02171v1 fatcat:fum77kjmd5hghbtn26kkpjdtzi

Short paper

Jaeyeon Jung, Seungyeop Han, David Wetherall
2012 Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12  
permissions architecture to install mobile apps.  ...  We report on a field study that uses a combination of OS measurements and qualitative interviews to highlight gaps between user expectations with respect to privacy and the result of using the existing  ...  ACKNOWLEDGMENTS We thank our study participants, Bongshin Lee at Microsoft Research for providing guidance to design the data visualization tool and many colleagues at Microsoft and UW who provided feedback  ... 
doi:10.1145/2381934.2381944 dblp:conf/ccs/JungHW12 fatcat:6vvvrasxszfcnn2hoshgpgleki

RiskMon

Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu
2014 Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14  
With the baseline, RiskMon assigns a risk score on every access attempt on sensitive information and ranks applications by their cumulative risk scores.  ...  by users' mobile applications, especially Android applications.  ...  We would also like to thank the anonymous reviewers for their valuable comments that helped improve the presentation of this paper.  ... 
doi:10.1145/2557547.2557549 dblp:conf/codaspy/JingAZH14 fatcat:qxxtiig345fnffsbotuyr5sghe

Flash Drive Lifespan *is* a Problem

Tao Zhang, Aviad Zuck, Donald E. Porter, Dan Tsafrir
2017 Proceedings of the 16th Workshop on Hot Topics in Operating Systems - HotOS '17  
This paper started as a simple experiment: measuring whether the lifespan of flash devices in smartphones and other mobile devices, match the estimates.  ...  To our surprise, we find that, in a matter of days, simple, unprivileged applications can render the drive of several smartphones (and thus, the phone) inoperable.  ...  This work was done in part while Porter and Zhang were at Stony Brook University.  ... 
doi:10.1145/3102980.3102988 dblp:conf/hotos/ZhangZPT17 fatcat:nab22s4dbnd2ziqjduvv7zqq2q

Content Analyzer for Information Leakage Detedction and Prevention in Android Smart Devices: A Conceptual Approach

T Okebule, Afe Babalola University, Ado Ekiti, Nigeria, O.A. Adeyemo, K.A. Olatunji, A.S Awe
2020 Advances in Multidisciplinary & Scientific Research Journal Publication  
The concept will help to minimize false positives that will in turn lead to increase in code coverage towards detecting the maximum number of data leaks.  ...  Literature shows that several phenomena had been developed to prevent malicious applications from stealing personal sensitive information from smart phones but there is still the need for efficient solutions  ...  Since mobile devices allow easy-to-use, touch-sensitive, and anywhere-anytime access to its resources, some of the resources being monitored includes but not limited to SMS, MMS, Bluetooth, e-mail, Network  ... 
doi:10.22624/aims/v6n1p7 fatcat:ug67jm35irg6rjxuf35s4onrnm

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Then, we analyze hotspots and trends of CPS security technologies in three dimensions: (1) architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care  ...  Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation.  ...  As more vendors develop mobile apps to control their devices, the access control issues in these apps are also worthy of attention.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  practices in the ecosystem.  ...  For example, lacking SOP, malicious JS from an untrusted web site can easily abuse this feature to attack the parent app and access sensitive resources.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis

Li Lyna Zhang, Chieh-Jan Mike Liang, Zhao Lucis Li, Yunxin Liu, Feng Zhao, En-Hong Chen
2018 IEEE Transactions on Mobile Computing  
To this end, we propose to use sensitivity analysis to infer whether an app requests sensitive on-device resources/data that are not required for its expected functionality.  ...  We build on the direction of risk rating as the way to communicate app-specific privacy risks to end users.  ...  Automated Testing of Mobile Apps The community has invested efforts in detecting and protecting users from privacy risks.  ... 
doi:10.1109/tmc.2017.2708716 fatcat:fintafqoife2dejvg5ur4z5ks4

Contextual Permission Models for Better Privacy Protection

Primal Wijesekera
2018 Zenodo  
Smartphone platforms use permission systems to regulate access to sensitive resources.  ...  We found that when the application requesting the permission is running invisibly to the user, they are more likely to deny applications access to protected resources.  ...  This data could be immensely valuable for future research in privacy, mobile user behavior, measurements, etc.  ... 
doi:10.5281/zenodo.3264743 fatcat:6oeru7cp6vemhblacvwunqbfde

Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis

Ilaria Liccardi, Joseph Pato, Daniel J. Weitzner
2014 Journal of Privacy and Confidentiality  
In order to understand the dynamics of information collection in mobile apps and to demonstrate the value of transparent access to the details of mobile applications information access permissions, we  ...  Therefore, in order to make real control available to mobile users, apps distribution platforms should provide more detailed information about how their data if accessed is used.  ...  Patterns of mobile phone usage are valuable in detecting behavior trends, especially for marketing [23] , as well as customizing and personalizing services offered to users.  ... 
doi:10.29012/jpc.v5i2.630 fatcat:vejlflyqwfhuzf362dsmxft34i

CamForensics

Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon P. Cox, Kyu-Han Kim
2017 Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems - SenSys '17  
For example, a user might be surprised to find that an augmented-reality makeup app extracts text from the camera's view in addition to detecting faces.  ...  However, because camera permissions for existing mobile operating systems are coarse (i.e., an app may access a camera's entire view or none of it), users are vulnerable to visual privacy leaks.  ...  Studies suggest that the users aware of the nuances of the app do not tend to allow the resource access as often [9, 32] .  ... 
doi:10.1145/3131672.3131683 dblp:conf/sensys/SrivastavaJDCK17 fatcat:x6jivl5wxvfz5f5ldn2t7txxu4

A Context-Sensitive Tool to Support Mobile Technology Acceptance Research

Elisabeth Pergler, Richard Hable, Ernesto Rico-Schmidt, Christian Kittl, Rainer Schamberger
2014 2014 47th Hawaii International Conference on System Sciences  
In this paper, we outline the development of a contextsensitive support tool for mobile technology acceptance research.  ...  The system was developed in a co-creation process that involved potential users, i.e. members of the mobile Living Lab in which the tool will be used.  ...  The practical relevance lies within the opportunity to a) create better accepted mobile apps based on the novel information, b) detect potential for novel context-adaptive services, c) and to unveil unexpected  ... 
doi:10.1109/hicss.2014.133 dblp:conf/hicss/PerglerHRKS14 fatcat:jczmvch7gbgxfki7xzcsicbgau
« Previous Showing results 1 — 15 out of 3,251 results