The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and the apps they run warrant novel techniques to explore the behavior of both downloaded and pre-installed apps. Mobile apps are increasing in size and complexity, making them more challenging to design and test. Focusing on Android, the most popular mobile platform, I present methodologies to automatically analyze the states of Android apps without access to source code and from a security perspective. Primarily, my research suggests approaches to overcome the limitations of current binary code analysis techniques to also include external and environmental inputs. I explain how utilizing this augmented set of inputs we can discover unsafe app ...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
As usage of the Android applications has grown, security concerns have also increased. Four major th...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
The rapid increase in mobile malware and deployment of over-privileged applications over the years h...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
With the increasing complexity of application software there is an acute need for software analysis ...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
As usage of the Android applications has grown, security concerns have also increased. Four major th...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
The rapid increase in mobile malware and deployment of over-privileged applications over the years h...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
With the increasing complexity of application software there is an acute need for software analysis ...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Today, Smartphones are very powerful, and many of its applications use wireless multimedia communic...