Shahriar et al. - Google Patents
Secure and Reliable Mobile Applications: Challenges and ApproachesShahriar et al.
View PDF- Document ID
- 10038159081915094670
- Author
- Shahriar H
- Marietta G
External Links
Snippet
Secure and Reliable Mobile Application: Challenges and Approaches Page 1 Secure and
Reliable Mobile Application: Challenges and Approaches Dr. Hossain Shahriar Kennesaw
State University, USA hshahria@kennesaw.edu For SAC 2016 Attendees Only Page 2 …
- 230000000694 effects 0 description 39
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12316656B2 (en) | Detecting repackaged applications based on file format fingerprints | |
| Tam et al. | The evolution of android malware and android analysis techniques | |
| US10867041B2 (en) | Static and dynamic security analysis of apps for mobile devices | |
| US12197573B2 (en) | Integrated application analysis and endpoint protection | |
| CN103890770A (en) | System and method for whitelisting applications in a mobile network environment | |
| CN103875003A (en) | System and method for whitelisting applications in a mobile network environment | |
| Ibrahim et al. | SafetyNOT: on the usage of the SafetyNet attestation API in Android | |
| Cooper et al. | A survey of android malware characterisitics and mitigation techniques | |
| Cao et al. | Rotten apples spoil the bunch: an anatomy of Google Play malware | |
| Casati et al. | The dangers of rooting: data leakage detection in android applications | |
| US10970392B2 (en) | Grouping application components for classification and malware detection | |
| Ruggia et al. | Android, notify me when it is time to go phishing | |
| Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
| Choi et al. | Large‐Scale Analysis of Remote Code Injection Attacks in Android Apps | |
| Pouryousef et al. | Let me join two worlds! analyzing the integration of web and native technologies in hybrid mobile apps | |
| Chang et al. | Towards a multilayered permission‐based access control for extending Android security | |
| Spreitzenbarth | Dissecting the Droid: Forensic analysis of android and its malicious applications | |
| Hwang et al. | All about activity injection: Threats, semantics, detection, and defense | |
| Cao | Understanding the characteristics of invasive malware from the Google Play Store | |
| Bhandari et al. | Android app collusion threat and mitigation techniques | |
| Pei et al. | ASCAA: API‐level security certification of android applications | |
| Shahriar et al. | Secure and Reliable Mobile Applications: Challenges and Approaches | |
| Chang et al. | Vulnerable service invocation and countermeasures | |
| Hallman et al. | Risk metrics for android (trademark) devices | |
| Maharjan | Ranking of android apps based on security evidences |