The number of applications for the Android platform found on Google Play is now over 1 million and there are over 1.5 billion downloads each month . With a low cost of entry the Android platform attracts developers many of which do not have the necessary competence or experience to develop secure applications. Weassess 20 Android applications using a custom testing methodology based on the OWASP Mobile Project and look for common vulnerabilities. We decompileapplications using Dare and review the source codemanually as well as using static and dynamic analysis to look for vulnerabilities.We also evaluate existing vulnerability classifications and argue which onesare most fitting to apply to Android vulnerabilities for educational and resear...
The mobile applications have overtaken web applications in the rapid growing of the mobile app marke...
As mobile applications become widely used, they have become targets for computer criminals to exploi...
Nowadays, mobile phones are used as multipurpose devices that fit in the palm of the hand having the...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
Applications within mobile devices, although useful and entertaining, come with security risks to pr...
How secure is your application? How can you evaluate if it is secure? The threats are many and may b...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
Thesis (M.S.)--Boston UniversityAndroid is a major mobile operating system pre-installed and shipped...
With the increasing complexity of application software there is an acute need for software analysis ...
Privacy-related vulnerabilities and risks are often embedded into applications during their developm...
In the first part of the article we discuss international, industrial and national standards and met...
With the prosperity of the app economy, more than four million apps have been published in various m...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
This thesis examines security issues that might occur in the applications from Google Play. It exami...
The mobile applications have overtaken web applications in the rapid growing of the mobile app marke...
As mobile applications become widely used, they have become targets for computer criminals to exploi...
Nowadays, mobile phones are used as multipurpose devices that fit in the palm of the hand having the...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
Applications within mobile devices, although useful and entertaining, come with security risks to pr...
How secure is your application? How can you evaluate if it is secure? The threats are many and may b...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
Thesis (M.S.)--Boston UniversityAndroid is a major mobile operating system pre-installed and shipped...
With the increasing complexity of application software there is an acute need for software analysis ...
Privacy-related vulnerabilities and risks are often embedded into applications during their developm...
In the first part of the article we discuss international, industrial and national standards and met...
With the prosperity of the app economy, more than four million apps have been published in various m...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
This thesis examines security issues that might occur in the applications from Google Play. It exami...
The mobile applications have overtaken web applications in the rapid growing of the mobile app marke...
As mobile applications become widely used, they have become targets for computer criminals to exploi...
Nowadays, mobile phones are used as multipurpose devices that fit in the palm of the hand having the...