Abstract—Due to the prevalence of mobile phones usage and their increasing features and functionalities, the amount of personal and confidential data residing in the phones is becoming substantial. In the event of information theft by applications residing on the phones, the loss of such important data can be damaging to the user’s reputation or result in a financial loss. We show in this paper how these applications can appear to be non-malicious but are stealthily retrieving and exporting confidential information without leaving any trace, thus bypassing detections by current state-of-the-art anti-virus solutions. We propose a tool to detect and track the behaviour of these applications in real-time so as to collect evidence. Using this t...
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how m...
Internet users all over the world are highly exposed to social media exploitation, where they are vu...
Part 3: Mobile Device ForensicsInternational audienceThe “bring your own device” (BYOD) policy is ra...
Abstract: Mobile devices such as smart phones and laptops are in common use and carry a vast amount ...
The objective of this paper is to form an application “Theft Monitoring” wherever we have a tendency...
In few years Android has become the most widespread operating system among mobile devices. Its extre...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Mobile devices have become essential to modern society; however, as their popularity has grown, so h...
This paper proposes a procedure to enhance anti theft to prevent robbery for android based smartphon...
Smartphones have taken an important role in the current society that many found it impossible to do ...
Ever improving technology allows smartphones to become an integral part of people’s lives. The relia...
The growing popularity of smartphone devices has led to development of increasing numbers of applica...
Objectives The article presents a formal model of information security in mobile devices running the...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
Information applications are widely used by millions of users to perform manydifferent activities. A...
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how m...
Internet users all over the world are highly exposed to social media exploitation, where they are vu...
Part 3: Mobile Device ForensicsInternational audienceThe “bring your own device” (BYOD) policy is ra...
Abstract: Mobile devices such as smart phones and laptops are in common use and carry a vast amount ...
The objective of this paper is to form an application “Theft Monitoring” wherever we have a tendency...
In few years Android has become the most widespread operating system among mobile devices. Its extre...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Mobile devices have become essential to modern society; however, as their popularity has grown, so h...
This paper proposes a procedure to enhance anti theft to prevent robbery for android based smartphon...
Smartphones have taken an important role in the current society that many found it impossible to do ...
Ever improving technology allows smartphones to become an integral part of people’s lives. The relia...
The growing popularity of smartphone devices has led to development of increasing numbers of applica...
Objectives The article presents a formal model of information security in mobile devices running the...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
Information applications are widely used by millions of users to perform manydifferent activities. A...
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how m...
Internet users all over the world are highly exposed to social media exploitation, where they are vu...
Part 3: Mobile Device ForensicsInternational audienceThe “bring your own device” (BYOD) policy is ra...