A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Expectation and purpose
2012
Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12
We report on the results of using crowdsourcing to capture users' expectations of what sensitive resources mobile apps use. ...
Smartphone security research has produced many useful tools to analyze the privacy-related behaviors of mobile apps. ...
Android Permissions The Android permission framework is intended to serve two purposes in protecting users: (1) to limit mobile apps' access to sensitive resources, and (2) to assist users in making trust ...
doi:10.1145/2370216.2370290
dblp:conf/huc/LinSALHZ12
fatcat:dlj3ncjqtnbn5mibjwazhou2mq
Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping
[chapter]
2019
Lecture Notes in Computer Science
Besides various other privacy concerns with mobile devices, many people suspect their smartphones to be secretly eavesdropping on them. ...
Taking into account existing access control mechanisms, detection methods, and other technical aspects, we point out remaining vulnerabilities and research gaps. ...
There are also many documented cases of mobile apps using their microphone access in unexpected ways. ...
doi:10.1007/978-3-030-22479-0_6
fatcat:v4bmsoiybnbspmwt4w2vhsimli
A Survey of Android Security Threats and Defenses
2015
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
As a result, mobile users are left to decide for themselves whether an app is safe to use. ...
use of mobile resources. ...
In probation mode, at run time, an app has to request permission from users to access sensitive resources (e.g. GPS traces, contact information, friend list) when the resource is needed. ...
doi:10.22667/jowua.2015.09.31.003
dblp:journals/jowua/RashidiF15
fatcat:xapwtq76cvbsvcwlubtan5aqu4
Aware: Controlling App Access to I/O Devices on Mobile Platforms
[article]
2016
arXiv
pre-print
Contemporary mobile operating systems fail to prevent such misuse of I/O devices by authorized apps due to lack of binding between users' interactions and accesses to I/O devices performed by these apps ...
In this paper, we propose Aware, a security framework for authorizing app requests to perform operations using I/O devices, which binds app requests with user intentions to make all uses of certain I/O ...
On average, there are 8 requests per minute by processes running apps to request permission to access sensitive resources [36] . 10 The timer is used to support apps that require users to keep pressing ...
arXiv:1604.02171v1
fatcat:fum77kjmd5hghbtn26kkpjdtzi
Short paper
2012
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12
permissions architecture to install mobile apps. ...
We report on a field study that uses a combination of OS measurements and qualitative interviews to highlight gaps between user expectations with respect to privacy and the result of using the existing ...
ACKNOWLEDGMENTS We thank our study participants, Bongshin Lee at Microsoft Research for providing guidance to design the data visualization tool and many colleagues at Microsoft and UW who provided feedback ...
doi:10.1145/2381934.2381944
dblp:conf/ccs/JungHW12
fatcat:6vvvrasxszfcnn2hoshgpgleki
RiskMon
2014
Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14
With the baseline, RiskMon assigns a risk score on every access attempt on sensitive information and ranks applications by their cumulative risk scores. ...
by users' mobile applications, especially Android applications. ...
We would also like to thank the anonymous reviewers for their valuable comments that helped improve the presentation of this paper. ...
doi:10.1145/2557547.2557549
dblp:conf/codaspy/JingAZH14
fatcat:qxxtiig345fnffsbotuyr5sghe
Flash Drive Lifespan *is* a Problem
2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems - HotOS '17
This paper started as a simple experiment: measuring whether the lifespan of flash devices in smartphones and other mobile devices, match the estimates. ...
To our surprise, we find that, in a matter of days, simple, unprivileged applications can render the drive of several smartphones (and thus, the phone) inoperable. ...
This work was done in part while Porter and Zhang were at Stony Brook University. ...
doi:10.1145/3102980.3102988
dblp:conf/hotos/ZhangZPT17
fatcat:nab22s4dbnd2ziqjduvv7zqq2q
Content Analyzer for Information Leakage Detedction and Prevention in Android Smart Devices: A Conceptual Approach
2020
Advances in Multidisciplinary & Scientific Research Journal Publication
The concept will help to minimize false positives that will in turn lead to increase in code coverage towards detecting the maximum number of data leaks. ...
Literature shows that several phenomena had been developed to prevent malicious applications from stealing personal sensitive information from smart phones but there is still the need for efficient solutions ...
Since mobile devices allow easy-to-use, touch-sensitive, and anywhere-anytime access to its resources, some of the resources being monitored includes but not limited to SMS, MMS, Bluetooth, e-mail, Network ...
doi:10.22624/aims/v6n1p7
fatcat:ug67jm35irg6rjxuf35s4onrnm
A Survey on Recent Advanced Research of CPS Security
2021
Applied Sciences
Then, we analyze hotspots and trends of CPS security technologies in three dimensions: (1) architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care ...
Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation. ...
As more vendors develop mobile apps to control their devices, the access control issues in these apps are also worthy of attention. ...
doi:10.3390/app11093751
fatcat:fxby2wjzpnchrfshvilxalmptm
Toward Engineering a Secure Android Ecosystem
2016
ACM Computing Surveys
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. ...
practices in the ecosystem. ...
For example, lacking SOP, malicious JS from an untrusted web site can easily abuse this feature to attack the parent app and access sensitive resources. ...
doi:10.1145/2963145
fatcat:d5vhxpdywrevvbh4as6vvt576q
Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis
2018
IEEE Transactions on Mobile Computing
To this end, we propose to use sensitivity analysis to infer whether an app requests sensitive on-device resources/data that are not required for its expected functionality. ...
We build on the direction of risk rating as the way to communicate app-specific privacy risks to end users. ...
Automated Testing of Mobile Apps The community has invested efforts in detecting and protecting users from privacy risks. ...
doi:10.1109/tmc.2017.2708716
fatcat:fintafqoife2dejvg5ur4z5ks4
Contextual Permission Models for Better Privacy Protection
2018
Zenodo
Smartphone platforms use permission systems to regulate access to sensitive resources. ...
We found that when the application requesting the permission is running invisibly to the user, they are more likely to deny applications access to protected resources. ...
This data could be immensely valuable for future research in privacy, mobile user behavior, measurements, etc. ...
doi:10.5281/zenodo.3264743
fatcat:6oeru7cp6vemhblacvwunqbfde
Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis
2014
Journal of Privacy and Confidentiality
In order to understand the dynamics of information collection in mobile apps and to demonstrate the value of transparent access to the details of mobile applications information access permissions, we ...
Therefore, in order to make real control available to mobile users, apps distribution platforms should provide more detailed information about how their data if accessed is used. ...
Patterns of mobile phone usage are valuable in detecting behavior trends, especially for marketing [23] , as well as customizing and personalizing services offered to users. ...
doi:10.29012/jpc.v5i2.630
fatcat:vejlflyqwfhuzf362dsmxft34i
CamForensics
2017
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems - SenSys '17
For example, a user might be surprised to find that an augmented-reality makeup app extracts text from the camera's view in addition to detecting faces. ...
However, because camera permissions for existing mobile operating systems are coarse (i.e., an app may access a camera's entire view or none of it), users are vulnerable to visual privacy leaks. ...
Studies suggest that the users aware of the nuances of the app do not tend to allow the resource access as often [9, 32] . ...
doi:10.1145/3131672.3131683
dblp:conf/sensys/SrivastavaJDCK17
fatcat:x6jivl5wxvfz5f5ldn2t7txxu4
A Context-Sensitive Tool to Support Mobile Technology Acceptance Research
2014
2014 47th Hawaii International Conference on System Sciences
In this paper, we outline the development of a contextsensitive support tool for mobile technology acceptance research. ...
The system was developed in a co-creation process that involved potential users, i.e. members of the mobile Living Lab in which the tool will be used. ...
The practical relevance lies within the opportunity to a) create better accepted mobile apps based on the novel information, b) detect potential for novel context-adaptive services, c) and to unveil unexpected ...
doi:10.1109/hicss.2014.133
dblp:conf/hicss/PerglerHRKS14
fatcat:jczmvch7gbgxfki7xzcsicbgau
« Previous
Showing results 1 — 15 out of 3,251 results