The fluidity of application markets complicate smart-phone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone ap-plications. This paper seeks to better understand smart-phone application security by studying 1,100 popular free Android applications. We introduce the ded decom-piler, which recovers Android application source code directly from its installation image. We design and exe-cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. Our analysis uncovered pervasive use/misuse of person-al/phone identifiers, and deep penetration of advertising and analytics networks. Ho...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Abstract—Mobile devices have evolved from simple devices, which are used for a phone call and SMS me...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
In last decade smartphones more and more are becoming our daily life accessory. Whenever it used for...
The number of applications for the Android platform found on Google Play is now over 1 million and t...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
It is a known fact that Android mobile phones' security has room for improvement. Many malicious app...
A paper co-authored by William Glisson published in the Proceedings of the 50th Hawaii International...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Abstract—Mobile devices have evolved from simple devices, which are used for a phone call and SMS me...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
In last decade smartphones more and more are becoming our daily life accessory. Whenever it used for...
The number of applications for the Android platform found on Google Play is now over 1 million and t...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
It is a known fact that Android mobile phones' security has room for improvement. Many malicious app...
A paper co-authored by William Glisson published in the Proceedings of the 50th Hawaii International...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Abstract—Mobile devices have evolved from simple devices, which are used for a phone call and SMS me...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...