A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

Android permissions: User attention, comprehension, and behavior

AP Felt, E Ha, S Egelman, A Haney, E Chin… - Proceedings of the …, 2012 - dl.acm.org
Android's permission system is intended to inform users about the risks of installing
applications. When a user installs an application, he or she has the opportunity to review the …

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study

B Brinton Anderson, A Vance, CB Kirwan… - European Journal of …, 2016 - Taylor & Francis
Users are vital to the information security of organizations. In spite of technical safeguards,
users make many critical security decisions. An example is users' responses to security …

Using probabilistic generative models for ranking risks of android apps

H Peng, C Gates, B Sarma, N Li, Y Qi… - Proceedings of the …, 2012 - dl.acm.org
One of Android's main defense mechanisms against malicious apps is a risk communication
mechanism which, before a user installs an app, warns the user about the permissions the …

Android permissions: a perspective combining risks and benefits

BP Sarma, N Li, C Gates, R Potharaju… - Proceedings of the 17th …, 2012 - dl.acm.org
The phenomenal growth of the Android platform in the past few years has made it a lucrative
target of malicious application (app) developers. There are numerous instances of malware …

Delegate the smartphone user? Security awareness in smartphone platforms

A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …

[PDF][PDF] The effectiveness of application permissions

AP Felt, K Greenwood, D Wagner - 2nd USENIX Conference on Web …, 2011 - usenix.org
Traditional user-based permission systems assign the user's full privileges to all
applications. Modern platforms are transitioning to a new model, in which each application …

[HTML][HTML] Applying staged event-driven access control to combat ransomware

T McIntosh, ASM Kayes, YPP Chen, A Ng… - Computers & Security, 2023 - Elsevier
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …

User-driven access control: Rethinking permission granting in modern operating systems

F Roesner, T Kohno, A Moshchuk… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web
browsers, run each application in an isolated environment with limited privileges. A pressing …

How to ask for permission

AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner - HotSec, 2012 - usenix.org
Application platforms provide applications with access to hardware (eg, GPS and cameras)
and personal data. Modern platforms use permission systems to protect access to these …