We can notice that security problems of inappropriate integration of native and web technologies in hybrid mobile applications (apps) have been covered in the related state-of-the-art research. However, analyzing hybrid mobile apps' unique behaviors has been seldom addressed. In this paper, we explore the influence of native and web technologies integration in hybrid mobile apps on the generated profile of mobile applications. Specifically, we analyze the type of Security Sensitive APIs (SS-APIs) exposed to web content and identify the corresponding usage patterns by systematically tracking function-call-graphs of a large number of hybrid and native mobile apps. Our investigations indicate that the generated profiles for hybrid and native m...
The use of smartphones and hand-held devices continues to increase with rapid development in underly...
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
Nowadays, mobile app developers are enjoying the benefits of the amalgamation of web and mobile plat...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Mobile users are increasingly becoming targets of malware infections and scams. In order to curb suc...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
AbstractAmong all available Mobile OS, Android is an ideal target for attackers due to its huge popu...
A hybrid mobile application (app) is a mobile app that is based on the web running within a containe...
Android users are often overwhelmed by security issues arising in the apps they use. Although malwar...
The repo contains the tool iWanDroid: Artifacts for the paper Demand-driven Information Flow Analysi...
The use of smartphones and hand-held devices continues to increase with rapid development in underly...
Hybrid mobile application development frameworks are used to develop mobile applications with web st...
The use of smartphones and hand-held devices continues to increase with rapid development in underly...
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
Nowadays, mobile app developers are enjoying the benefits of the amalgamation of web and mobile plat...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Mobile users are increasingly becoming targets of malware infections and scams. In order to curb suc...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
AbstractAmong all available Mobile OS, Android is an ideal target for attackers due to its huge popu...
A hybrid mobile application (app) is a mobile app that is based on the web running within a containe...
Android users are often overwhelmed by security issues arising in the apps they use. Although malwar...
The repo contains the tool iWanDroid: Artifacts for the paper Demand-driven Information Flow Analysi...
The use of smartphones and hand-held devices continues to increase with rapid development in underly...
Hybrid mobile application development frameworks are used to develop mobile applications with web st...
The use of smartphones and hand-held devices continues to increase with rapid development in underly...
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks, which can...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...