Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on the Google Play store. The security concerns for developing mobile web apps go beyond just those for developing traditional web apps or mobile apps. In this paper we develop scalable analyses for finding several classes of vulnerabilities in mobile web apps and analyze a large dataset of 998,286 mobile web apps, representing a complete snapshot of all of the free mobile web apps on the Google Play store as of June 2014. We find that 28 % of the studied apps have at least one vulnerability. We explore the severity of these vulnerabilities and identify trends in the vulnerable apps. We find that severe vulnerabilities are present across the enti...
peer reviewedThe Android ecosystem today is a growing universe of a few billion devices, hundreds of...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can...
The number of applications for the Android platform found on Google Play is now over 1 million and t...
With the prosperity of the app economy, more than four million apps have been published in various m...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
Abstract. Securing browsers in mobile devices is very challenging, be-cause these browser apps usual...
Thesis (M.S.)--Boston UniversityAndroid is a major mobile operating system pre-installed and shipped...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...
With over 2 billion active mobile users and a large array of features, Android is the most popular o...
Privacy-related vulnerabilities and risks are often embedded into applications during their developm...
With over 2 billion active mobile users and a large array of features, Android is the most popular o...
We can notice that security problems of inappropriate integration of native and web technologies in ...
With the increasing complexity of application software there is an acute need for software analysis ...
peer reviewedThe Android ecosystem today is a growing universe of a few billion devices, hundreds of...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can...
The number of applications for the Android platform found on Google Play is now over 1 million and t...
With the prosperity of the app economy, more than four million apps have been published in various m...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
Abstract. Securing browsers in mobile devices is very challenging, be-cause these browser apps usual...
Thesis (M.S.)--Boston UniversityAndroid is a major mobile operating system pre-installed and shipped...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...
With over 2 billion active mobile users and a large array of features, Android is the most popular o...
Privacy-related vulnerabilities and risks are often embedded into applications during their developm...
With over 2 billion active mobile users and a large array of features, Android is the most popular o...
We can notice that security problems of inappropriate integration of native and web technologies in ...
With the increasing complexity of application software there is an acute need for software analysis ...
peer reviewedThe Android ecosystem today is a growing universe of a few billion devices, hundreds of...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can...