Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Delegate the smartphone user? Security awareness in smartphone platforms

A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …

The insider threat in cloud computing

M Kandias, N Virvilis, D Gritzalis - … September 8-9, 2011, Revised Selected …, 2013 - Springer
Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic
and versatile provision of computational resources and services. Even though the …

Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?

N Virvilis, D Gritzalis… - 2013 IEEE 10th …, 2013 - ieeexplore.ieee.org
As both the number and the complexity of cyber attacks continuously increase, it is
becoming evident that traditional security mechanisms have limited success in detecting …

A risk assessment method for smartphones

M Theoharidou, A Mylonas, D Gritzalis - … , Crete, Greece, June 4-6, 2012 …, 2012 - Springer
Smartphones are multi-purpose ubiquitous devices, which face both, smartphone-specific
and typical security threats. This paper describes a method for risk assessment that is …

Modeling and enhancing android's permission system

E Fragkaki, L Bauer, L Jia, D Swasey - … , Pisa, Italy, September 10-12, 2012 …, 2012 - Springer
Several works have recently shown that Android's security architecture cannot prevent many
undesired behaviors that compromise the integrity of applications and the privacy of their …

Smartphone sensor data as digital evidence

A Mylonas, V Meletiadis, L Mitrou, D Gritzalis - Computers & Security, 2013 - Elsevier
The proliferation of smartphones introduces new opportunities in digital forensics. One of the
reasons is that smartphones are usually equipped with sensors (eg accelerometer, proximity …

Assessing privacy risks in android: A user-centric approach

A Mylonas, M Theoharidou, D Gritzalis - Risk Assessment and Risk-Driven …, 2014 - Springer
The increasing presence of privacy violating apps in app marketplaces poses a significant
privacy risk for smartphone users. Current approaches assessing privacy risk lack user …

Playing with danger: A taxonomy and evaluation of threats to smart toys

S Shasha, M Mahmoud, M Mannan… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Smart toys have captured an increasing share of the toy market, and are growing ubiquitous
in households with children. Smart toys are a subset of Internet of Things (IoT) devices …

[BOOK][B] Extracting Malware Threat Patterns on a Mobile Platform

GJK Jakka - 2021 - search.proquest.com
This study focuses on the rapidly increasing frequency of smartphone malware attacks
since2019. Most users have relied on smartphones as they are a rich source of valuable …