Current resource policies for mobile phone apps are based on permissions that unconditionally grant or deny access to a resource like private data, sensors and services. In reality, the legitimacy of an access may be context-dependent - for example, depending on how often a resource is accessed and in which situation. This thesis presents research into providing bounds on the access of JavaScript apps to security and privacy-relevant resources on mobile devices. The investigated bounds are quantitative and interaction-dependent: for example, permitting one access each time the user presses a specified button. Two novel systems are presented with different approaches to providing these bounds. The system PhoneWrap injects a quantita...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
We analyze the data collection strategies of 65,000 developers in the market for mobile applications...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
International audienceA model of resource access control is presented in which the access control to...
Mobile apps brought unprecedented convenience to everyday life, and nowadays, hardly any interactive...
The widespread adoption of the Android operating system in a variety type of devices ranging from sm...
Mobile operating systems pervade our modern lives. Security and privacy is of particular concern on ...
On mobile operating systems, apps may access resources that are not be needed for their primary func...
Hybrid mobile application development frameworks are used to develop mobile applications with web st...
Today's phone could be described as a charismatic tool that has the ability to keep human beings cap...
© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and priva...
AbstractThe instantaneous growth of mobile apps in mobile markets elevating the concerns on the prot...
A model of resource access control is presented in which the access control to resources can employ ...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
We analyze the data collection strategies of 65,000 developers in the market for mobile applications...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
AbstractThe widespread adoption of the Android operating system in a variety type of devices ranging...
International audienceA model of resource access control is presented in which the access control to...
Mobile apps brought unprecedented convenience to everyday life, and nowadays, hardly any interactive...
The widespread adoption of the Android operating system in a variety type of devices ranging from sm...
Mobile operating systems pervade our modern lives. Security and privacy is of particular concern on ...
On mobile operating systems, apps may access resources that are not be needed for their primary func...
Hybrid mobile application development frameworks are used to develop mobile applications with web st...
Today's phone could be described as a charismatic tool that has the ability to keep human beings cap...
© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and priva...
AbstractThe instantaneous growth of mobile apps in mobile markets elevating the concerns on the prot...
A model of resource access control is presented in which the access control to resources can employ ...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
We analyze the data collection strategies of 65,000 developers in the market for mobile applications...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...