Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
Measuring and Characterizing (Mis)compliance of the Android Permission System
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 4Pages 742–764https://doi.org/10.1109/TSE.2024.3362921Within the Android mobile operating system, Android permissions act as a system of safeguards designed to restrict access to potentially sensitive data and privileged components. Multiple research studies indicate flaws and limitations of the Android ...
- research-articleApril 2024
Detecting Overlay Attacks in Android
Procedia Computer Science (PROCS), Volume 231, Issue CPages 137–144https://doi.org/10.1016/j.procs.2023.12.185AbstractOverlay attacks have long been a significant security concern affecting Android devices. Despite Android touch prevention mechanisms for external apps, internal apps and those sharing the same userID remain susceptible. Contrary to Android's ...
- ArticleApril 2024
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study
AbstractSignificant advances in the language processing field are providing new innovations, including the ability to analyze code for weaknesses. Typically, analyzing code security is performed by tools that use known vulnerable patterns, which may not ...
- ArticleDecember 2023
Certificate Reuse in Android Applications
AbstractThe widespread adoption of Android apps has led to increasing concerns about the concept of “recycled trust” derived from the reuse of digital certificates. Android app developers frequently depend on digital certificates to sign their ...
- research-articleAugust 2022
Analysis and prediction of web proxies misbehavior
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 61, Pages 1–11https://doi.org/10.1145/3538969.3544412The need for anonymity and privacy has given a rise to open web proxies that act as gateways relaying traffic between web servers and their clients, allowing users to access otherwise not accessible content. As the open web proxy ecosystem continues to ...