To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT) era, a cloud computing provides an effective platform without human intervention to build a resource-oriented security solution. However, existing malware detection methods are constrained by a vague situation of information leaks. The main goal of this paper is to measure a degree of hiding intention for the mobile application (app) to keep its leaking activity invisible to the user. For real-world application test, we target Android applications, which unleash user privacy data. With the TaintDroid-ported emulator, we make experiments about the timing distance between user events and privacy leaks. Our experiments with Android apps downlo...
Increasingly, malicious Android apps use various methods to steal private user data without their kn...
Android OS enforces security and privacy by means of sandboxing to isolate the execution of one appl...
© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition ...
Privacy protection against mobile applications on mobile de-vices is becoming a serious concern as u...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
Mobile apps feed on variety of users’ information to provide great services. Some of the features re...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
International audienceSmartphones have become an important component of everyday's life. They store ...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
Increasingly, malicious Android apps use various methods to steal private user data without their kn...
Android OS enforces security and privacy by means of sandboxing to isolate the execution of one appl...
© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition ...
Privacy protection against mobile applications on mobile de-vices is becoming a serious concern as u...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
Mobile apps feed on variety of users’ information to provide great services. Some of the features re...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
International audienceSmartphones have become an important component of everyday's life. They store ...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
Increasingly, malicious Android apps use various methods to steal private user data without their kn...
Android OS enforces security and privacy by means of sandboxing to isolate the execution of one appl...
© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition ...