A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …
exploitations that employ a variety of attack vectors and strategies to psychologically …
Android permissions: User attention, comprehension, and behavior
Android's permission system is intended to inform users about the risks of installing
applications. When a user installs an application, he or she has the opportunity to review the …
applications. When a user installs an application, he or she has the opportunity to review the …
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
Users are vital to the information security of organizations. In spite of technical safeguards,
users make many critical security decisions. An example is users' responses to security …
users make many critical security decisions. An example is users' responses to security …
Using probabilistic generative models for ranking risks of android apps
One of Android's main defense mechanisms against malicious apps is a risk communication
mechanism which, before a user installs an app, warns the user about the permissions the …
mechanism which, before a user installs an app, warns the user about the permissions the …
Android permissions: a perspective combining risks and benefits
The phenomenal growth of the Android platform in the past few years has made it a lucrative
target of malicious application (app) developers. There are numerous instances of malware …
target of malicious application (app) developers. There are numerous instances of malware …
Delegate the smartphone user? Security awareness in smartphone platforms
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …
application repositories. Attackers may use this centralized application delivery architecture …
[PDF][PDF] The effectiveness of application permissions
Traditional user-based permission systems assign the user's full privileges to all
applications. Modern platforms are transitioning to a new model, in which each application …
applications. Modern platforms are transitioning to a new model, in which each application …
[HTML][HTML] Applying staged event-driven access control to combat ransomware
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
User-driven access control: Rethinking permission granting in modern operating systems
Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web
browsers, run each application in an isolated environment with limited privileges. A pressing …
browsers, run each application in an isolated environment with limited privileges. A pressing …
How to ask for permission
Application platforms provide applications with access to hardware (eg, GPS and cameras)
and personal data. Modern platforms use permission systems to protect access to these …
and personal data. Modern platforms use permission systems to protect access to these …