The tremendous success of the mobile application paradigm is due to the ease with which new applications are uploaded by developers, distributed through the application markets (e.g. Google Play), and finally installed by the users. Yet, the very same model is causing serious security concerns, since users have no or little means to ascertain the trustworthiness of the applications they install on their devices. To protect their customers, Poste Italiane has defined the Mobile Application Verification Cluster (MAVERIC), a process for the systematic security analysis of third-party mobile apps that leverage the online services provided by the company (e.g. home banking, parcel tracking). We present SAM, a toolkit that supports this process b...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Security-by-Contract (S?C) is a paradigm providing security assurances for mobile applications.In th...
The tremendous success of the mobile application paradigm is due to the ease with which new applicat...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Mobile computing is on the rise. More and more users rely on mobile applications and mobile devices ...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
Today’s smart-phones are ubiquitous in people’s lives, collecting and storing private and confident...
We study the “anti-theft ” mechanisms available to con-sumers to thwart unauthorised access to perso...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
The Android ecosystem gained a huge popularity and market share owing to wider compatibility and its...
Nowadays, mobile phones are used as multipurpose devices that fit in the palm of the hand having the...
In current Bring-Your-Own-Device (BYOD) settings, companies struggle to assess and control the secur...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Security-by-Contract (S?C) is a paradigm providing security assurances for mobile applications.In th...
The tremendous success of the mobile application paradigm is due to the ease with which new applicat...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Mobile computing is on the rise. More and more users rely on mobile applications and mobile devices ...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
Today’s smart-phones are ubiquitous in people’s lives, collecting and storing private and confident...
We study the “anti-theft ” mechanisms available to con-sumers to thwart unauthorised access to perso...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
The Android ecosystem gained a huge popularity and market share owing to wider compatibility and its...
Nowadays, mobile phones are used as multipurpose devices that fit in the palm of the hand having the...
In current Bring-Your-Own-Device (BYOD) settings, companies struggle to assess and control the secur...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Security-by-Contract (S?C) is a paradigm providing security assurances for mobile applications.In th...