To see the other types of publications on this topic, follow the link: APP PERMISSION.

Journal articles on the topic 'APP PERMISSION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'APP PERMISSION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Xu, Guosheng, Shengwei Xu, Chuan Gao, Bo Wang, and Guoai Xu. "PerHelper: Helping Developers Make Better Decisions on Permission Uses in Android Apps." Applied Sciences 9, no. 18 (2019): 3699. http://dx.doi.org/10.3390/app9183699.

Full text
Abstract:
Permission-related issues in Android apps have been widely studied in our research community, while most of the previous studies considered these issues from the perspective of app users. In this paper, we take a different angle to revisit the permission-related issues from the perspective of app developers. First, we perform an empirical study on investigating how we can help developers make better decisions on permission uses during app development. With detailed experimental results, we show that many permission-related issues can be identified and fixed during the application development p
APA, Harvard, Vancouver, ISO, and other styles
2

Ullah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (2022): 246. http://dx.doi.org/10.3390/electronics11020246.

Full text
Abstract:
Recently, smartphone usage has increased tremendously, and smartphones are being used as a requirement of daily life, equally by all age groups. Smartphone operating systems such as Android and iOS have made it possible for anyone with development skills to create apps for smartphones. This has enabled smartphone users to download and install applications from stores such as Google Play, App Store, and several other third-party sites. During installation, these applications request resource access permissions from users. The resources include hardware and software like contact, memory, locatio
APA, Harvard, Vancouver, ISO, and other styles
3

Naga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.

Full text
Abstract:
Mobile phone have user’s personal and private information. When mobile applications have the permission to access to this information they may leak it to third parties without user’s consent for their own benefits. As users are not aware of how their personal information would be used once applications are installed and permissions are granted, this raises a potential privacy concern. Therefore, there is a need for a risk assessment model that can intimate the users about the threats the mobile application poses to the user's private information. We propose an approach that helps in increasing
APA, Harvard, Vancouver, ISO, and other styles
4

Onik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (2019): 3997. http://dx.doi.org/10.3390/app9193997.

Full text
Abstract:
Android is offering millions of apps on Google Play-store by the application publishers. However, those publishers do have a parent organization and share information with them. Through the ‘Android permission system’, a user permits an app to access sensitive personal data. Large-scale personal data integration can reveal user identity, enabling new insights and earn revenue for the organizations. Similarly, aggregation of Android app permissions by the app owning parent organizations can also cause privacy leakage by revealing the user profile. This work classifies risky personal data by pro
APA, Harvard, Vancouver, ISO, and other styles
5

Karri, Praveen Kumar, D. Jaya Kumari, and Sowmya Sree Karri. "A Scalable Malware Detection Approach through Significant Permission Identification for Android Devices." International Journal of Innovation in Multidisciplinary Scientific Research 02, no. 01 (2024): 24–29. http://dx.doi.org/10.61239/ijimsr.2024.2113.

Full text
Abstract:
The global ubiquity of smartphones has led to the availability of many free apps for gaming, communication, financial, and educational needs. However, hazardous malicious software targeting smartphones has increased as the global adoption of these devices has grown. Malware is growing rapidly, with reports predicting a new Android app every 10 seconds, threatening the mobile ecosystem. Due to Android's versatility, users can install apps from third-party app shops and file-sharing websites, compounding malware outbreaks. The seriousness of this situation requires scalable malware detection. Ba
APA, Harvard, Vancouver, ISO, and other styles
6

Paul, Nishtha, Arpita Jadhav Bhatt, Sakeena Rizvi, and Shubhangi. "Malware Detection in Android Apps Using Static Analysis." Journal of Cases on Information Technology 24, no. 3 (2022): 1–25. http://dx.doi.org/10.4018/jcit.20220701.oa6.

Full text
Abstract:
Frequency of malware attacks because Android apps are increasing day by day. Current studies have revealed startling facts about data harvesting incidents, where user’s personal data is at stake. To preserve privacy of users, a permission induced risk interface MalApp to identify privacy violations rising from granting permissions during app installation is proposed. It comprises of multi-fold process that performs static analysis based on app’s category. First, concept of reverse engineering is applied to extract app permissions to construct a Boolean-valued permission matrix. Second, ranking
APA, Harvard, Vancouver, ISO, and other styles
7

Xiong, Aiping, Huangyi Ge, Wanling Zou, Ninghui Li, and Robert W. Proctor. "Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 797. http://dx.doi.org/10.1177/1541931213601692.

Full text
Abstract:
Previous studies have shown that inclusion of a permission safety score/cue in the early stage of selecting an app assists users in making safer choices (Chen, Gates, Li, & Proctor, 2015; Gates, Chen, Li, & Proctor, 2014; Rajivan & Camp, 2016). Yet, user ratings were typically weighted more in app-selection decisions than a summary permission safety score, suggesting that app-associated risks are not fully understood or known by users. In daily interactions, people make privacy decisions not just based on rational considerations but also on heuristics (e.g., take the first, Dogruel
APA, Harvard, Vancouver, ISO, and other styles
8

Naderi, Hamid, and Behzad Kiani. "Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps." Frontiers in Health Informatics 9, no. 1 (2020): 41. http://dx.doi.org/10.30699/fhi.v9i1.224.

Full text
Abstract:
Introduction: In this study, Persian Android mobile health (mhealth) applications were studied to describe usage of dangerous permissions in health related mobile applications. So the most frequently normal and dangerous permissions used in mhealth applications were reviewed.Materials and Methods: We wrote a PHP script to crawl information of Android apps in “health” and “medicine” categories from Cafebazaar app store. Then permission information of these application were extracted.Results: 11627 permissions from 3331 studied apps were obtained. There was at least one dangerous permission in 4
APA, Harvard, Vancouver, ISO, and other styles
9

Reimer, Helmut. "App „Permission Watcher“ für Android-Smartphones." Datenschutz und Datensicherheit - DuD 36, no. 3 (2012): 218. http://dx.doi.org/10.1007/s11623-012-0079-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Zhongxin, Xin Xia, David Lo, and John Grundy. "Automatic, highly accurate app permission recommendation." Automated Software Engineering 26, no. 2 (2019): 241–74. http://dx.doi.org/10.1007/s10515-019-00254-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yilmaz, Saliha, and Mastaneh Davis. "Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 717–24. http://dx.doi.org/10.34190/eccws.22.1.1453.

Full text
Abstract:
The continuously increasing amount of data input on mobile devices has made collating and monitoring users’ data not only uniquely personalised but easier than ever. Along with that, mobile security threats have overtaken with rising numbers in bank fraud and personal information leaks. This suggests that there is a significant lack of awareness of security issues among mobile users. Specifically, permission-based passive content leaks are getting more attention due to the emerging issues in data privacy. One reason for this is that permissions are running in the background collecting and tran
APA, Harvard, Vancouver, ISO, and other styles
12

Amirulbahar, Azis, and Yova Ruldeviyani. "ANALYSIS OF EFFECTS OF APP PERMISSION CONCERNS ON INTENTIONS TO DISCLOSE PERSONAL INFORMATION: A CASE STUDY OF MONEY TRANSFER SERVICE APP." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 9, no. 1 (2023): 109–18. http://dx.doi.org/10.33480/jitk.v9i1.4316.

Full text
Abstract:
Data growth increased alongside the rise of mobile app users in financial services. In Indonesia, the number of financial services application downloads reached 24 million by the end of 2022, with a 28.72 percent increase in transactions. However, this growth also brings issues regarding the potential misuse of personal information, although according to the Personal Data Protection Act (UU PDP) in Indonesia, personal data is protected and kept confidential when accessed by another party. This prompts users to be more cautious in disclosing personal information. On the other hand, users are fa
APA, Harvard, Vancouver, ISO, and other styles
13

Ehsan, Adeel, Cagatay Catal, and Alok Mishra. "Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review." Sensors 22, no. 20 (2022): 7928. http://dx.doi.org/10.3390/s22207928.

Full text
Abstract:
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to run on a vast variety of devices, much of the user base possesses an Android phone. Its popularity and flexibility have played a major role in making it a target of different attacks via malware, causing loss to users, both financially and from a privacy perspective. Different malware and their variants are emerging every day, making it a huge challenge to come up with detection and preventive methodologies and tools. Research has spawned in various directions to yield effective malware detection
APA, Harvard, Vancouver, ISO, and other styles
14

Azam, Sami, Rajvinder Singh Sumra, Bharanidharan Shanmugam, Kheng Cher Yeo, Mirjam Jonokman, and Ganthan Narayana Samy. "Security Source Code Analysis of Applications in Android OS." International Journal of Engineering & Technology 7, no. 4.15 (2018): 30. http://dx.doi.org/10.14419/ijet.v7i4.15.21366.

Full text
Abstract:
It is a known fact that Android mobile phones’ security has room for improvement. Many malicious app developers have targeted android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request permission only during runtime, but not all users have this update. This is important because user permission is required to perform certain actions. The permissions may be irrelevant to the features provided by an
APA, Harvard, Vancouver, ISO, and other styles
15

Marquez, Antonio Flores, and Jozef Goetz. "Certificate Management Application." International Journal on Engineering, Science and Technology 5, no. 3 (2023): 191–211. http://dx.doi.org/10.46328/ijonest.165.

Full text
Abstract:
The purpose of the paper is to show how to expand the low code interactive framework in order to develop a web app for the broad needs of different fields. The goal of this work is to give a chance to computer science senior project students to work on a broad spectrum of projects using Apache, HTML, CSS, JavaScript, PHP, and MySQL. In this paper, the web app keeps track of recipients of computer science certificates. The web application is interactive, responsive, secured, password and database driven app. The web app uses a MYSQL database on the web server-side to record concentration, cours
APA, Harvard, Vancouver, ISO, and other styles
16

Chong, Isis, Huangyi Ge, Ningui Li, and Robert W. Proctor. "Influence of Privacy Priming and Security Framing on Android App Selection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 796. http://dx.doi.org/10.1177/1541931213601691.

Full text
Abstract:
Many users unknowingly grant mobile applications (apps) permission to access their personal information (Felt et al., 2012). This access is in part a result of the large number of permissions apps request and users’ difficulty in understanding the nature of these potentially harmful requests (Kelley et al., 2011; Liccardi et al., 2014). Laboratory studies have suggested that different approaches can be taken to curtail the likelihood of mobile users installing malicious apps. A large body of work investigating mobile app security agrees that it is indeed possible to get users to make safer and
APA, Harvard, Vancouver, ISO, and other styles
17

Che, Jiarui, Chenkai Guo, Naipeng Dong, et al. "Uncovering API-Scope Misalignment in the App-in-App Ecosystem." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 1933–54. https://doi.org/10.1145/3728962.

Full text
Abstract:
The "app-in-app" paradigm is an emerging trend in mobile systems, where super applications (short for superApps) such as WeChat, Baidu, TikTok, enable external vendors to develop mini-programs (short for miniApps) on their platforms by providing privileged APIs. To facilitate management, superApps have devised their specific permission configuration (called scope) to grant the APIs access to specific capabilities and resources. Adhering to these scopes during API implementation is crucial for maintaining security; otherwise, the permission management of superApps can be bypassed—a vulnerabilit
APA, Harvard, Vancouver, ISO, and other styles
18

Marsch, Maximilian, Jens Grossklags, and Sameer Patil. "Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–35. http://dx.doi.org/10.1145/3479581.

Full text
Abstract:
The ever increasing amount of data on smartphones often contains private information of others that people interact with via the device. As a result, one user's decisions regarding app permissions can expose the information of other parties. However, research typically focuses on consequences of privacy-related decisions only for the user who makes the decisions. Work on the impact of these decisions on the privacy of others is still relatively scant. We fill this gap with an online study that extends prior work on interdependent privacy in social networking sites to the context of smartphone
APA, Harvard, Vancouver, ISO, and other styles
19

Bagheri, Hamid, Alireza Sadeghi, Joshua Garcia, and Sam Malek. "COVERT: Compositional Analysis of Android Inter-App Permission Leakage." IEEE Transactions on Software Engineering 41, no. 9 (2015): 866–86. http://dx.doi.org/10.1109/tse.2015.2419611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Demissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnerabilities in Android apps." Empirical Software Engineering 25, no. 6 (2020): 5084–136. http://dx.doi.org/10.1007/s10664-020-09879-8.

Full text
Abstract:
Abstract The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is one of the reasons for the popularity of Android, but it also poses security risks to the end users because malicious, unprivileged apps could exploit this feature to make privileged apps perform privileged actions on behalf of them. In this paper, we investigate the hybrid use of program analysis, genetic algorithm based test generation, natural language processing, machine learning techniques for precise
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Zhuo, Dandan Zhang, Xiaoning Gao, and Yan Jin. "The impact of privacy authorization framing in mobile apps on privacy disclosure: a regulatory focus approach." Information Research an international electronic journal 30, iConf (2025): 476–85. https://doi.org/10.47989/ir30iconf47299.

Full text
Abstract:
Purpose. In the digital age, the tension between mobile app users obtaining personalized services and granting privacy permissions has become increasingly pronounced. The behavioral drivers and mechanisms influencing privacy disclosure in the context of privacy permissions require further investigation. By focusing on users' privacy disclosure intentions, this study aims to assist app platforms in designing privacy permission content that aligns with consumers' diverse privacy preferences and psychological needs, providing theoretical guidance and references for efficient platform operation. M
APA, Harvard, Vancouver, ISO, and other styles
22

Gautam, Abhishek. "PermiToggle: A Lightweight Mobile Application for Permission Awareness and Data Access Control." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1936–41. https://doi.org/10.22214/ijraset.2025.70500.

Full text
Abstract:
In the rapidly evolving landscape of mobile technology, smartphones serve as primary hubs for a wide range of applications that often require access to sensitive personal data. With this growing dependency on mobile apps, concerns surrounding data privacy and security have intensified. PermiToggle, addresses this issue by offering users a centralized platform to monitor, evaluate, and manage the permissions of all installed applications on their devices. The application delivers an intuitive interface that simplifies app management by displaying detailed information about each app, including d
APA, Harvard, Vancouver, ISO, and other styles
23

Smullen, Daniel, Yuanyuan Feng, Shikun Aerin Zhang, and Norman Sadeh. "The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (2020): 195–215. http://dx.doi.org/10.2478/popets-2020-0011.

Full text
Abstract:
AbstractIn today’s data-centric economy, data flows are increasingly diverse and complex. This is best exemplified by mobile apps, which are given access to an increasing number of sensitive APIs. Mobile operating systems have attempted to balance the introduction of sensitive APIs with a growing collection of permission settings, which users can grant or deny. The challenge is that the number of settings has become unmanageable. Yet research also shows that existing settings continue to fall short when it comes to accurately capturing people’s privacy preferences. An example is the inability
APA, Harvard, Vancouver, ISO, and other styles
24

S., Sashikumar, Vijay Babu G., and Angel Ingnishyaa F. "OPTIMIZATION OF PRIVACY AWARENESS OF MOBILE DATA." International Journal of Advanced Trends in Engineering and Technology (IJATET) 4, no. 1 (2019): 31–37. https://doi.org/10.5281/zenodo.3634343.

Full text
Abstract:
The popularity and advanced functionality of mobile devices has made them attractive targets for malicious and intrusive applications. Although strong security measures are in place for most mobile systems, the area where these systems often fail is the reliance on the user to make decisions that impact the security of a device. Android relies on users to understand the permissions that an app is requesting and installation decision on the list of permissions. Reliance on users is ineffective as most users do not understand or consider the permission information. A leverage method is to assign
APA, Harvard, Vancouver, ISO, and other styles
25

Tchomté, Naomi Dassi, Franklin Tchakounté, Clovis Kenmogne Tchuinte, and Kalum Priyanath Udagepola. "RetrieveDroid: k-NN Performance Evaluation of Distance Measurement Schemes for Android Malware Detection Using Case-Based Retrieval." European Journal of Information Technologies and Computer Science 4, no. 2 (2024): 16–21. http://dx.doi.org/10.24018/compute.2024.4.2.126.

Full text
Abstract:
One of the big challenges in cybersecurity is the detection of Android attacks since Android is the most popular mobile operating system. Within this system, applications require certain permissions to access critical resources. Investigation of the use of permissions is a concern to check whether an application is not mislead to divulge sensitive information. This work aims to determine whose distance schemes offers the best malware detection based on permission similarities. Case based reasoning (CBR) is a concept which aims to find a solution based on historical experiences. CBR performance
APA, Harvard, Vancouver, ISO, and other styles
26

Gao, Hongcan, Chenkai Guo, Guangdong Bai, et al. "Sharing runtime permission issues for developers based on similar-app review mining." Journal of Systems and Software 184 (February 2022): 111118. http://dx.doi.org/10.1016/j.jss.2021.111118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Namrud, Zakeya, Segla Kpodjedo, Ahmed Bali, and Chamseddine Talhi. "Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories." IEEE Access 10 (2022): 24240–54. http://dx.doi.org/10.1109/access.2022.3156083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Degirmenci, Kenan. "Mobile users’ information privacy concerns and the role of app permission requests." International Journal of Information Management 50 (February 2020): 261–72. http://dx.doi.org/10.1016/j.ijinfomgt.2019.05.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ismail, Qatrunnada, Tousif Ahmed, Kelly Caine, Apu Kapadia, and Michael Reiter. "To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 119–37. http://dx.doi.org/10.1515/popets-2017-0041.

Full text
Abstract:
Abstract Millions of apps available to smartphone owners request various permissions to resources on the devices including sensitive data such as location and contact information. Disabling permissions for sensitive resources could improve privacy but can also impact the usability of apps in ways users may not be able to predict. We study an efficient approach that ascertains the impact of disabling permissions on the usability of apps through large-scale, crowdsourced user testing with the ultimate goal of making recommendations to users about which permissions can be disabled for improved pr
APA, Harvard, Vancouver, ISO, and other styles
30

Dhanya Pramod, Manisha Patil,. "Enhancing Android Framework Used to Detect Unexpected Permission Authorization of Mobile Application." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 998–1005. http://dx.doi.org/10.52783/tjjpt.v44.i3.420.

Full text
Abstract:
The use of mobile devices is expanding daily in today's technological age. Mobile marketplaces are constantly providing an expanding selection of mobile applications to satisfy the demands of smartphone users. Many Android applications fall short in their attempts to adequately address security-related issues. This is usually brought on by a lack of automated methods for permission-based vulnerability discovery, testing, and resolution during early design and development phases. As a result, it is generally agreed that addressing such issues quickly is preferable to sending updates and fixes f
APA, Harvard, Vancouver, ISO, and other styles
31

Akbar, Fahad, Mehdi Hussain, Rafia Mumtaz, Qaiser Riaz, Ainuddin Wahid Abdul Wahab, and Ki-Hyun Jung. "Permissions-Based Detection of Android Malware Using Machine Learning." Symmetry 14, no. 4 (2022): 718. http://dx.doi.org/10.3390/sym14040718.

Full text
Abstract:
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive and private information stored on the devices. This is due to the asymmetry between informative permissions and irrelevant and redundant permissions for benign Apps. It also depends on the characteristics of the Android platform, such as adopting an open-source policy, supporting unofficial App stores, and the great tolerance for App verification; therefore the Android platform is destined to face such malicious intrusions. In this paper, we propose a permissions-based malware detection system (Pe
APA, Harvard, Vancouver, ISO, and other styles
32

Beitis, Angelos, Jeroen Robben, Alexander Matern, et al. "LANShield: Analysing and Protecting Local Network Access on Mobile Devices." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 5–23. https://doi.org/10.56553/popets-2025-0116.

Full text
Abstract:
Home and workplace networks typically safeguard against external threats but allow internal devices to communicate freely with each other. As a result, malicious code on an internal device can collect sensitive data about other devices or directly attack them. In this paper, we study mobile apps as potential sources of local network attacks, analyse their behaviour, design new defences, and evaluate and bypass existing mitigations. We first focus on Android, where apps with only the Internet permission can access all devices in the Local Area Network (LAN), meaning malicious apps can extract p
APA, Harvard, Vancouver, ISO, and other styles
33

Er-Rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "Estimate Risks Eate for Android Applications Using Android Permissions." International Journal of Mobile Computing and Multimedia Communications 12, no. 4 (2021): 1–15. http://dx.doi.org/10.4018/ijmcmc.289162.

Full text
Abstract:
In recent years, Android becomes the first target for hackers and malware developers, due to his inefficient permission model. In this article, we introduce our tool called PerUpSecure to manage permissions requested by Android applications, calculate the risk rates and display the results to the user, in order to help him to make a better decision. Thanks to our PerUpSecure, user will be able to install only the trusted application. As far as we know, the other existing tools focus only on measuring app risk after being installed, and not before as our tool does. Therefore, to evaluate our to
APA, Harvard, Vancouver, ISO, and other styles
34

Zebua, Taronisokhi, Rivalry Kristianto Hondro, and Eferoni Ndruru. "Message Security on Chat App based on Massey Omura Algorithm." IJISTECH (International Journal Of Information System & Technology) 1, no. 2 (2018): 16. http://dx.doi.org/10.30645/ijistech.v1i2.11.

Full text
Abstract:
Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
APA, Harvard, Vancouver, ISO, and other styles
35

Yuan, Hongli, and Yongchuan Tang. "MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty." Entropy 22, no. 7 (2020): 792. http://dx.doi.org/10.3390/e22070792.

Full text
Abstract:
Millions of Android applications (apps) are widely used today. Meanwhile, the number of malicious apps has increased exponentially. Currently, there are many security detection technologies for Android apps, such as static detection and dynamic detection. However, the uncertainty of the features in detection is not considered sufficiently in these technologies. Permissions play an important role in the security detection of Android apps. In this paper, a malicious application detection model based on features uncertainty (MADFU) is proposed. MADFU uses logistic regression function to describe
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Shijia, Yilin Liu, and Mahanth Gowda. "I Spy You." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (2022): 1–31. http://dx.doi.org/10.1145/3569486.

Full text
Abstract:
This paper presents iSpyU, a system that shows the feasibility of recognition of natural speech content played on a phone during conference calls (Skype, Zoom, etc) using a fusion of motion sensors such as accelerometer and gyroscope. While microphones require permissions from the user to be accessible by an app developer, the motion sensors are zero-permission sensors, thus accessible by a developer without alerting the user. This allows a malicious app to potentially eavesdrop on sensitive speech content played by the user's phone. In designing the attack, iSpyU tackles a number of technical
APA, Harvard, Vancouver, ISO, and other styles
37

Ramamurthy, Madhumitha. "Fraudster Mobile Apps Detector in Google Playstore." Journal of Computational and Theoretical Nanoscience 17, no. 4 (2020): 1752–57. http://dx.doi.org/10.1166/jctn.2020.8437.

Full text
Abstract:
The identification of the fraudulent app in Google playstore is determined by users only by executing apps and by analyzing permission. An app which has higher rating, ranking and good reviews in Google playstore may attract more users to download and can also be ranked higher in the leader board. The rating, ranking and reviews are not always real to believe that an app is a legitimate one. Some fraudulent developers boost their apps dishonestly in Google playstore. Hence in this paper, we propose a method to detect the fraud app in Google playstore by aggregating the three evidences in the p
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Shikun, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, and Norman Sadeh. "How Usable Are iOS App Privacy Labels?" Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 204–28. http://dx.doi.org/10.56553/popets-2022-0106.

Full text
Abstract:
Standardized privacy labels that succinctly summarize those data practices that people are most commonly concerned about offer the promise of providing users with more effective privacy notices than full-length privacy policies. With their introduction by Apple in iOS 14 and Google’s recent adoption in its Play Store, mobile app privacy labels are for the first time available at scale to users. We report the first indepth interview study with 24 lay iPhone users to investigate their experiences, understanding, and perceptions of Apple’s privacy labels. We uncovered misunderstandings of and dis
APA, Harvard, Vancouver, ISO, and other styles
39

Olukoya, Oluwafemi, Lewis Mackenzie, and Inah Omoronyia. "Security-oriented view of app behaviour using textual descriptions and user-granted permission requests." Computers & Security 89 (February 2020): 101685. http://dx.doi.org/10.1016/j.cose.2019.101685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Rao, M. Devanand. "Privacy Concerns in Android Applications: An Overview of Risks and Solutions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft003.

Full text
Abstract:
Abstract—Android, the world’s leading smartphone operating system, powers billions of devices and provides access to billions of programs. Its wide outreach, however, is accompanied by tremendous concerns over user privacy. Quite a number of Android applications collect, store, and send data from their users perhaps without their consent, opening it to misuse. This paper analyzes the most important privacy issues of Android apps, considering over- permissioning, data leakage, tracking by third parties, and insecure data storage and communication. Based on recent trends and actual instances, we
APA, Harvard, Vancouver, ISO, and other styles
41

Pan, Elleen, Jingjing Ren, Martina Lindorfer, Christo Wilson, and David Choffnes. "Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 33–50. http://dx.doi.org/10.1515/popets-2018-0030.

Full text
Abstract:
Abstract The high-fidelity sensors and ubiquitous internet connectivity offered by mobile devices have facilitated an explosion in mobile apps that rely on multimedia features. However, these sensors can also be used in ways that may violate user’s expectations and personal privacy. For example, apps have been caught taking pictures without the user’s knowledge and passively listened for inaudible, ultrasonic audio beacons. The developers of mobile device operating systems recognize that sensor data is sensitive, but unfortunately existing permission models only mitigate some of the privacy co
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Minki, Daehan Kim, Changha Hwang, Seongje Cho, Sangchul Han, and Minkyu Park. "Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions." Applied Sciences 11, no. 21 (2021): 10244. http://dx.doi.org/10.3390/app112110244.

Full text
Abstract:
Malware family classification is grouping malware samples that have the same or similar characteristics into the same family. It plays a crucial role in understanding notable malicious patterns and recovering from malware infections. Although many machine learning approaches have been devised for this problem, there are still several open questions including, “Which features, classifiers, and evaluation metrics are better for malware familial classification”? In this paper, we propose a machine learning approach to Android malware family classification using built-in and custom permissions. Ea
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Han Seong, and Hyung-Woo Lee. "Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps." Journal of the Korea Convergence Society 8, no. 3 (2017): 49–61. http://dx.doi.org/10.15207/jkcs.2017.8.3.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yang†, Yucheng, Jack West†, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz. "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 373–93. http://dx.doi.org/10.56553/popets-2022-0077.

Full text
Abstract:
Video conferencing apps (VCAs) make it possible for previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their private data during meetings. While access to a device’s video camera is carefully controlled, little has been done to ensure the same level of privacy for accessing the microphone. In this work, we ask the question: what happens to the microphone data when a user clicks the mute butto
APA, Harvard, Vancouver, ISO, and other styles
45

Zakariya, R. Ahmad Imanullah, and Kalamullah Ramli. "Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 4 (2023): 831–42. https://doi.org/10.25126/jtiik.2024107029.

Full text
Abstract:
Aplikasi berbasis Android banyak dikembangkan dan tersedia secara bebas di berbagai sumber aplikasi karena sistem operasi Android yang bersifat open-source. Namun, tidak semua penyedia aplikasi memberikan informasi detail mengenai aspek keamanan aplikasi, sehingga pengguna mengalami kesulitan untuk menilai dan memahami risiko keamanan privasi yang mereka hadapi. Pada penelitian ini kami mengusulkan desain penilaian risiko privasi melalui pendekatan analisis permission dan informasi atribut aplikasi. Kami menggunakan ensemble learning untuk mengatasi kelemahan dari penggunaan model klasifikasi
APA, Harvard, Vancouver, ISO, and other styles
46

Mehrnezhad, Maryam, and Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" Informatics 6, no. 1 (2019): 7. http://dx.doi.org/10.3390/informatics6010007.

Full text
Abstract:
Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users and makes the task of sensor management more complex. In this paper, first, we discuss the issues around the security and privacy of mobile sensors. We investigate the available sensors on mainstrea
APA, Harvard, Vancouver, ISO, and other styles
47

Nisha, Badwaik* Vijay Bagdi. "AN SUPERVISED METHOD FOR DETECTION MALWARE BY USING MACHINE LEARNING ALGORITHM." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 287–90. https://doi.org/10.5281/zenodo.192894.

Full text
Abstract:
There is Explosive increase in mobile application more and more threat, viruses and benign are migrate from traditional PC to mobile devices. Existence of this information and access creates more importance which makes device attractive targets for malicious entities. For this we proposed a probabilistic discriminative model which has regularized logistic regression for android malware detection with decompiled source code. There are so many approaches for detection of android malware has been proposed by using permission or source code analysis or dynamic analysis. In this survey paper, we us
APA, Harvard, Vancouver, ISO, and other styles
48

Ratul, Sikder, Shohel Khan Md, Shohrab Hossain Md, and Zada Khan Wazir. "A survey on android security: development and deployment hindrance and best practices." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 485–99. https://doi.org/10.12928/TELKOMNIKA.v18i1.13288.

Full text
Abstract:
Android OS is the most popular mobile OS for the past few years. Vulnerabilities arise with respect to the increasing functionality of Android OS, impolitic app development practices of developers, end-user incautious and interestingly remediation for the vulnerabilities has been introduced frequently as well. To mitigate security risk factor Google has been updated, deprecated and restricted many system level APIs for 3 rd party developers. Considering the consequences, this paper provides a wide overview of Android’s system level app development, privacy issues, and guideline for the d
APA, Harvard, Vancouver, ISO, and other styles
49

Acheampong, Rebecca, Dorin-Mircea Popovici, Titus C. Balan, Alexandre Rekeraho, and Ionut-Alexandru Oprea. "A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality." Information 16, no. 6 (2025): 430. https://doi.org/10.3390/info16060430.

Full text
Abstract:
Our society is becoming increasingly dependent on technology, with immersive virtual worlds such as Extended Reality (XR) transforming how we connect and interact. XR technologies enhance communication and operational efficiency. They have been adopted in sectors such as manufacturing, education, and healthcare. However, the immersive and interconnected nature of XR introduces security risks that span from technical and human to psychological vulnerabilities. In this study, we examined security threats in XR environments through a scenario-driven risk assessment, using a hybrid approach combin
APA, Harvard, Vancouver, ISO, and other styles
50

Abdullah, Zubaile, and Madihah Mohd Saudi. "RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet." International Journal of Engineering & Technology 7, no. 4.15 (2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.15.21370.

Full text
Abstract:
Android applications may pose risks to smartphone users. Most of the current security countermeasures for detecting dangerous apps show some weaknesses. In this paper, a risk assessment method is proposed to evaluate the risk level of Android apps in terms of confidentiality (privacy), integrity (financial) and availability (system). The proposed research performs mathematical analysis of an app and returns a single easy to understand evaluation of the app’s risk level (i.e., Very Low, Low, Moderate, High, and Very High). These schemes have been tested on 2488 samples coming from Google Play a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!