[PDF][PDF] Resolving the Predicament of Android Custom Permissions.

GS Tuncay, S Demetriou, K Ganju, CA Gunter - NDSS, 2018 - comp97109.doc.ic.ac.uk
Android leverages a set of system permissions to protect platform resources. At the same
time, it allows untrusted third-party applications to declare their own custom permissions to …

Analyzing & designing the security of shared resources on smartphone operating systems

S Demetriou - 2018 - ideals.illinois.edu
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In
fact, smartphones became the de facto devices users leverage to manage personal …

Practical least privilege for cross-origin interactions on mobile operating systems

GS Tuncay - 2019 - ideals.illinois.edu
Mobile operating systems (ie, mobile platforms) favor flexibility and re-usability as design
principles and provide mobile applications with channels for establishing cross-origin …

[BOOK][B] Analyzing Consumer's Awareness of Protecting Personally Identifiable Information on Android Smartphones

DD Capellman - 2018 - search.proquest.com
Using a technical development staff consisting of Program Managers, System Engineers,
and Software Developers, this phenomenological study will investigate their experiences …