Mobile devices are evolving as the dominant computing platform and consequently application repositories and app markets are becoming the prevalent paradigm for deploying software. Due to their central and trusted position in the software ecosystem, coerced, hacked or malicious app markets pose a serious threat to user security. Currently, there is little that hinders a nation state adversary (NSA) or other powerful attackers from using such central and trusted points of software distribution to deploy customized (malicious) versions of apps to specific users. Due to intransparencies in the current app installation paradigm, this kind of attack is extremely hard to detect. In this paper, we evaluate the risks and drawbacks of current app de...
Abstract. Compared to traditional desktop software, Android applica-tions are delivered through soft...
The Android platform gives mobile device users the opportunity to extend the capabilities of their s...
In this thesis, we investigate different possibilities to protect the Android ecosystem better. We f...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
Application marketplaces are the main software distribution mechanism for modern mobile devices but ...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Abstract—Mobile applications are part of the everyday lives of billions of people, who often trust t...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
A significant amount of apps submitted to mobile market places (MMP) are illegitimate, resulting in ...
Smartphones are highly-capable mobile computing devices that have dramatically changed how people d...
Today’s smart-phones are ubiquitous in people’s lives, collecting and storing private and confident...
Abstract. Compared to traditional desktop software, Android applica-tions are delivered through soft...
Abstract. Compared to traditional desktop software, Android applica-tions are delivered through soft...
The Android platform gives mobile device users the opportunity to extend the capabilities of their s...
In this thesis, we investigate different possibilities to protect the Android ecosystem better. We f...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
Application marketplaces are the main software distribution mechanism for modern mobile devices but ...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Abstract—Mobile applications are part of the everyday lives of billions of people, who often trust t...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
A significant amount of apps submitted to mobile market places (MMP) are illegitimate, resulting in ...
Smartphones are highly-capable mobile computing devices that have dramatically changed how people d...
Today’s smart-phones are ubiquitous in people’s lives, collecting and storing private and confident...
Abstract. Compared to traditional desktop software, Android applica-tions are delivered through soft...
Abstract. Compared to traditional desktop software, Android applica-tions are delivered through soft...
The Android platform gives mobile device users the opportunity to extend the capabilities of their s...
In this thesis, we investigate different possibilities to protect the Android ecosystem better. We f...