Results 1 - 10
of
2,144
On Lightweight Mobile Phone Application Certification
- ACM Conference on Computer and Communications Security
, 2009
"... Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of applications results in a greater chance of installing Trojans and similar malware. In this paper, we propose the Kirin securi ..."
Abstract
-
Cited by 186 (10 self)
- Add to MetaCart
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of applications results in a greater chance of installing Trojans and similar malware. In this paper, we propose the Kirin
The Case for VM-based Cloudlets in Mobile Computing
"... Mobile computing is at a fork in the road. After two decades of sustained effort by many researchers, we have developed the core concepts, techniques and mechanisms to provide a solid foundation for this still fast-growing ..."
Abstract
-
Cited by 211 (21 self)
- Add to MetaCart
Mobile computing is at a fork in the road. After two decades of sustained effort by many researchers, we have developed the core concepts, techniques and mechanisms to provide a solid foundation for this still fast-growing
Mobile Documentation: Usability
"... guidelines for user assistance on tablets and smartphones Marta Rauch, Oracle Corporation Mobile devices are the new PC. With sales outpacing desktop systems in 2011, consumers increasingly use smartphones and tablets to access products and services. However, mobile usability lags behind desktop usa ..."
Abstract
- Add to MetaCart
guidelines for user assistance on tablets and smartphones Marta Rauch, Oracle Corporation Mobile devices are the new PC. With sales outpacing desktop systems in 2011, consumers increasingly use smartphones and tablets to access products and services. However, mobile usability lags behind desktop
SECURITY THREATS TO ANDROID APPS BY
"... Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile applications (app for short) to store and handle private information. The fluidity of mobile apps and mobile app markets has com-plicated mobile app security. Many new threats emerged are either because of ..."
Abstract
- Add to MetaCart
of the deficiency of mobile app development or the design ambiguities of the Android operating system. In order to seek a better understanding of mobile app security, we present a systematic study on security threats to Android apps in two dimensions. First, we study Android apps from mobile health (m
Mobile Development for iPhone and Android
"... A comparison of 3rd party development for the iPhone and Android platforms ..."
Abstract
- Add to MetaCart
A comparison of 3rd party development for the iPhone and Android platforms
Quantifying the Danger of Mobile Banking Applications on the Android Platform
"... Abstract—The percentage of consumers that utilize mobile banking has increased in the past year and continues to grow. Mobile users are concerned about, but often do not understand the security risks that might be involved when conducting financial transactions through a mobile application. This res ..."
Abstract
- Add to MetaCart
. This research investigates application permissions and whether they are categorized as dangerous or normal as per the Android developer guidelines. In the absence of an existing risk index, we created ADI (Application Danger Index) based on these two types of permissions to help quantify the possible danger
PSiOS: Bring Your Own Privacy & Security to iOS Devices
"... Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS provides application sandboxing but assigns a generic sandboxing profile to every third-party application. However, recent attacks and incidents with benign applications demonstrate that this design d ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS provides application sandboxing but assigns a generic sandboxing profile to every third-party application. However, recent attacks and incidents with benign applications demonstrate that this design
Contextual Android Education
, 2010
"... With advances in mobile phone hardware, the demand for mobile applica-tions has risen drastically. This has resulted in mobile phones becoming a pop-ular new medium for application development. However, the body of knowledge for contextual examples and tutorials leaves much to be desired. As of Janu ..."
Abstract
- Add to MetaCart
. As of January 2010, California Polytechnic State University has offered a mobile development class that teaches students how to write applications for phones running Google’s Android platform. This class aims at taking advantage of students ’ current in-terest in mobile applications to teach them about
Security Analysis of Android Factory Resets
"... With hundreds of millions of devices expected to be traded by 20181, flaws in smartphone sanitisation functions could be a serious problem. Trade press reports2 have al-ready raised doubts about the effectiveness of Android “Fac-tory Reset”, but this paper presents the first comprehensive study of t ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
With hundreds of millions of devices expected to be traded by 20181, flaws in smartphone sanitisation functions could be a serious problem. Trade press reports2 have al-ready raised doubts about the effectiveness of Android “Fac-tory Reset”, but this paper presents the first comprehensive study
Studying and Enabling Reuse in Android Mobile Apps
"... In the recent years, studies of design and programming practices in mobile development are gaining more attention from researchers. Several such empirical studies used Android applications (paid, free, and open source) to analyze factors such as size, quality, dependencies, reuse, and cloning. Most ..."
Abstract
- Add to MetaCart
In the recent years, studies of design and programming practices in mobile development are gaining more attention from researchers. Several such empirical studies used Android applications (paid, free, and open source) to analyze factors such as size, quality, dependencies, reuse, and cloning. Most
Results 1 - 10
of
2,144