This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia. It provides a comprehensive review of existing academic literature about security in Android focusing especially on malware detection systems and existing malware databases. Through the implementation of a methodology for identification of malicious applications it has been collected data revealing a 5% of them as malicious in an overall analysis. Furthermore, the analysis shown that Russia and Europe have a preponderance of generic detections and adware, while Chine i found to be targeted mainly by riskware and malware
Due to the latest technology breakthrough, mobile devices have become an indispensable part of peopl...
Android is currently the most popular smartphone operating system. However, users feel their private...
The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. A...
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize ...
In recent years, the global pervasiveness of smartphones has prompted the development of millions of...
Due to the increased number of mobile devices, they are integrated in every dimension of our daily l...
This thesis describes various security issues in Smartphones and the security mechanisms used by the...
Abstract—Mobile devices have evolved from simple devices, which are used for a phone call and SMS me...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
As reported, Android is the most popular platform for Smartphone today with a mar-ket share of 84.7 ...
International audienceSince Android became the first smartphone operating system, malware developers...
International audienceTen years ago, Google released the first version of its new operating system: ...
AbstractAmong all available Mobile OS, Android is an ideal target for attackers due to its huge popu...
The Android platform is that the quickest growing market in smart phone operating systems thus far. ...
Nowadays smartphones are playing active roles in people’s life. A smartphone is no longer a simple c...
Due to the latest technology breakthrough, mobile devices have become an indispensable part of peopl...
Android is currently the most popular smartphone operating system. However, users feel their private...
The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. A...
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize ...
In recent years, the global pervasiveness of smartphones has prompted the development of millions of...
Due to the increased number of mobile devices, they are integrated in every dimension of our daily l...
This thesis describes various security issues in Smartphones and the security mechanisms used by the...
Abstract—Mobile devices have evolved from simple devices, which are used for a phone call and SMS me...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
As reported, Android is the most popular platform for Smartphone today with a mar-ket share of 84.7 ...
International audienceSince Android became the first smartphone operating system, malware developers...
International audienceTen years ago, Google released the first version of its new operating system: ...
AbstractAmong all available Mobile OS, Android is an ideal target for attackers due to its huge popu...
The Android platform is that the quickest growing market in smart phone operating systems thus far. ...
Nowadays smartphones are playing active roles in people’s life. A smartphone is no longer a simple c...
Due to the latest technology breakthrough, mobile devices have become an indispensable part of peopl...
Android is currently the most popular smartphone operating system. However, users feel their private...
The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. A...