Android's app ecosystem relies heavily on third-party libraries as they facilitate code development and provide a steady stream of revenue for developers. However, while Android has moved towards a more fine-grained run time permission system, users currently lack the required resources for deciding whether a specific permission request is actually intended for the app itself or is requested by possibly dangerous third-party libraries. In this paper we present Reaper, a novel dynamic analysis system that traces the permissions requested by apps in real time and distinguishes those requested by the app's core functionality from those requested by third-party libraries linked with the app. We implement a sophisticated UI automator and conduc...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
With the unprecedented growth in the diversity of digital distribution platforms, there has been an ...
To protect user’s privacy and system’s integrity,\ud mobile platforms use permission models to contr...
To protect the privacy of end users from intended or unintended malicious behaviour, the Android ope...
Since Android apps receive white-card access through permissions, users struggle to understand the a...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
Click on the DOI link to access the article (may not be free).Permission mechanisms play a crucial r...
Although Android’s permission system is intended to allow users to make informed decisions about the...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Privacy has become a key concern for smartphone users as many apps tend to access and share sensitiv...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...
Summary. We propose Dagger, a lightweight system to dynamically vet sens-itive behaviors in Android ...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
With the unprecedented growth in the diversity of digital distribution platforms, there has been an ...
To protect user’s privacy and system’s integrity,\ud mobile platforms use permission models to contr...
To protect the privacy of end users from intended or unintended malicious behaviour, the Android ope...
Since Android apps receive white-card access through permissions, users struggle to understand the a...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
Click on the DOI link to access the article (may not be free).Permission mechanisms play a crucial r...
Although Android’s permission system is intended to allow users to make informed decisions about the...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Privacy has become a key concern for smartphone users as many apps tend to access and share sensitiv...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...
Summary. We propose Dagger, a lightweight system to dynamically vet sens-itive behaviors in Android ...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
With the unprecedented growth in the diversity of digital distribution platforms, there has been an ...
To protect user’s privacy and system’s integrity,\ud mobile platforms use permission models to contr...