In current Bring-Your-Own-Device (BYOD) settings, companies struggle to assess and control the security level of their employee's smartphones. App distribution points like the Apple App Store and Google Play provide app reviews and malware checks, but these measures are opaque and not aligned with corporate-specific security guidelines. In this paper, we present a framework which allows companies to run automated security checks, tailored to their specific security requirements and independent of app markets. Our framework orchestrates different plug-in security services for checking mobile devices for malware, misbehaving apps, and configurations. The framework operates on a virtual replica which is created from the physical device, thereb...
Android users are often overwhelmed by security issues arising in the apps they use. Although malwar...
The tremendous success of the mobile application paradigm is due to the ease with which new applicat...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
The emerging Bring Your Own Device (BYOD) paradigm is pushing the adoption of employees\u2019 person...
Quite often, organizations are confronted with the burden of managing mobile device assets, requiri...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Security-by-contract is a paradigm proposed for the secure installation, usage, and monitoring of ap...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
Abstract Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile a...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
Today, smartphones are in widespread use by consumers, commercial companies and government authoriti...
As a result of several attractive features of mobile devices (portability and access to voice and d...
The widespread usage of mobile devices and their seamless adaptation to each user’s needs through us...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
Abstract. Apps don’t come with any guarantees that they are not ma-licious. This paper introduces a ...
Android users are often overwhelmed by security issues arising in the apps they use. Although malwar...
The tremendous success of the mobile application paradigm is due to the ease with which new applicat...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
The emerging Bring Your Own Device (BYOD) paradigm is pushing the adoption of employees\u2019 person...
Quite often, organizations are confronted with the burden of managing mobile device assets, requiri...
During the last few years mobile phones have been being replaced by new devices called smartphones. ...
Security-by-contract is a paradigm proposed for the secure installation, usage, and monitoring of ap...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
Abstract Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile a...
The swift and continuous evolution of mobile devices is encouraging both private and public organiza...
Today, smartphones are in widespread use by consumers, commercial companies and government authoriti...
As a result of several attractive features of mobile devices (portability and access to voice and d...
The widespread usage of mobile devices and their seamless adaptation to each user’s needs through us...
Abstract — By changing the way software is delivered to end-users, markets for mobile apps create a ...
Abstract. Apps don’t come with any guarantees that they are not ma-licious. This paper introduces a ...
Android users are often overwhelmed by security issues arising in the apps they use. Although malwar...
The tremendous success of the mobile application paradigm is due to the ease with which new applicat...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...