The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Practical and lightweight domain isolation on android

S Bugiel, L Davi, A Dmitrienko, S Heuser… - Proceedings of the 1st …, 2011 - dl.acm.org
In this paper, we introduce a security framework for practical and lightweight domain
isolation on Android to mitigate unauthorized data access and communication among …

[PDF][PDF] A Context-aware Adaptive Security Framework for Mobile Applications.

Y Mowafi, I Dhiah el Diehn, T Al-Aqarbeh, M Abilov… - ICCASA, 2014 - researchgate.net
Mobile devices currently offer many value-added applications and services such as
messaging, navigation, social networking, finance, and entertainment. As these mobile …

Risk assessment of user-defined security configurations for android devices

D Vecchiato, M Vieira, E Martins - 2016 IEEE 27th International …, 2016 - computer.org
The wide spreading of mobile devices, such as smartphones and tablets, and their
advancing capabilities, ranging from taking photos to accessing banking accounts, make …

Security for mobile device assets: A survey

A Lima, B Sousa, T Cruz, P Simoes - … 5th International Conference …, 2017 - books.google.com
Organizations are often faced with the need to manage large numbers of mobile device
assets, including tight control over aspects such as usage profiles, customization …

MobileGuardian: A security policy enforcement framework for mobile devices

Y Wang, K Vangury, J Nikolai - 2014 International Conference …, 2014 - ieeexplore.ieee.org
Mobile devices such as smartphones and tablets are widely used for personal and business
uses. Compared to personal mobile subscribers, enterprises have more concerns about …

Understanding users' perceptions of security in mobile devices using the two-step cluster analysis

NT Agu, JE Chukwuere… - International Journal of …, 2023 - inderscienceonline.com
In the modern world, people of all income levels own mobile devices. This means that an
unprecedented number of people with different behaviours now own mobile devices …

Security frameworks for machine-to-machine devices and networks

M Demblewski - 2015 - search.proquest.com
Attacks against mobile systems have escalated over the past decade. There have been
increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new …

Using innovation diffusion theory and the technolgy acceptance model to evaluate the security of wireless mobile devices at a post secondary institution

HL Feliciano-Torres - 2017 - search.proquest.com
The purpose of this quantitative, descriptive non experimental study was to investigate the
use of wireless mobile network devices at a post-secondary institution using the innovation …

[PDF][PDF] Analysis and Classification of Android Malware

K Tam - 2016 - researchgate.net
With the integration of mobile devices into our daily lives, smartphones are privy to
increasing amounts of sensitive information. As of 2016, Android is the leading smartphone …