[go: up one dir, main page]

Shahriar et al. - Google Patents

Secure and Reliable Mobile Applications: Challenges and Approaches

Shahriar et al.

View PDF
Document ID
10038159081915094670
Author
Shahriar H
Marietta G

External Links

Snippet

Secure and Reliable Mobile Application: Challenges and Approaches Page 1 Secure and Reliable Mobile Application: Challenges and Approaches Dr. Hossain Shahriar Kennesaw State University, USA hshahria@kennesaw.edu For SAC 2016 Attendees Only Page 2 …
Continue reading at www.sigapp.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US12316656B2 (en) Detecting repackaged applications based on file format fingerprints
Tam et al. The evolution of android malware and android analysis techniques
US10867041B2 (en) Static and dynamic security analysis of apps for mobile devices
US12197573B2 (en) Integrated application analysis and endpoint protection
CN103890770A (en) System and method for whitelisting applications in a mobile network environment
CN103875003A (en) System and method for whitelisting applications in a mobile network environment
Ibrahim et al. SafetyNOT: on the usage of the SafetyNet attestation API in Android
Cooper et al. A survey of android malware characterisitics and mitigation techniques
Cao et al. Rotten apples spoil the bunch: an anatomy of Google Play malware
Casati et al. The dangers of rooting: data leakage detection in android applications
US10970392B2 (en) Grouping application components for classification and malware detection
Ruggia et al. Android, notify me when it is time to go phishing
Gupta et al. Developing a blockchain-based and distributed database-oriented multi-malware detection engine
Choi et al. Large‐Scale Analysis of Remote Code Injection Attacks in Android Apps
Pouryousef et al. Let me join two worlds! analyzing the integration of web and native technologies in hybrid mobile apps
Chang et al. Towards a multilayered permission‐based access control for extending Android security
Spreitzenbarth Dissecting the Droid: Forensic analysis of android and its malicious applications
Hwang et al. All about activity injection: Threats, semantics, detection, and defense
Cao Understanding the characteristics of invasive malware from the Google Play Store
Bhandari et al. Android app collusion threat and mitigation techniques
Pei et al. ASCAA: API‐level security certification of android applications
Shahriar et al. Secure and Reliable Mobile Applications: Challenges and Approaches
Chang et al. Vulnerable service invocation and countermeasures
Hallman et al. Risk metrics for android (trademark) devices
Maharjan Ranking of android apps based on security evidences