Ozbay et al., 2022 - Google Patents
Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed ApplicationsOzbay et al., 2022
View PDF- Document ID
- 9711468687307725340
- Author
- Ozbay A
- Bicakci K
- Publication year
- Publication venue
- An Analysis and Scoring System for Pre-Installed Applications
External Links
Snippet
Most users have no idea that their Android devices are equipped with many pre-installed applications which have the capability of tracking and monitoring them. Although applications coming pre-installed pose a great danger to user security and privacy, they …
- 238000004458 analytical method 0 title description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gamba et al. | An analysis of pre-installed android software | |
| US12120519B2 (en) | Determining a security state based on communication with an authenticity server | |
| Kollnig et al. | Are iphones really better for privacy? comparative study of ios and android apps | |
| Reardon et al. | 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system | |
| US11336458B2 (en) | Evaluating authenticity of applications based on assessing user device context for increased security | |
| Feal et al. | Angel or devil? a privacy study of mobile parental control apps | |
| Reyes et al. | “Won’t somebody think of the children?” examining COPPA compliance at scale | |
| US9940454B2 (en) | Determining source of side-loaded software using signature of authorship | |
| Agarwal et al. | ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing | |
| US10789594B2 (en) | Method and system to intelligently assess and mitigate security risks on a mobile device | |
| Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
| Calciati et al. | Automatically granted permissions in Android apps: An empirical study on their prevalence and on the potential threats for privacy | |
| Wang et al. | Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications | |
| Alenezi et al. | Abusing android permissions: A security perspective | |
| Orjiude et al. | A multilateral privacy impact analysis method for android applications | |
| Liu et al. | Android mobile OS snooping by Samsung, Xiaomi, Huawei and Realme handsets | |
| Liu et al. | On the data privacy practices of Android OEMs | |
| Štefanko | Android stalkerware vulnerabilities | |
| Özbay et al. | Should Users Trust Their Android Devices? A Scoring System for Assessing Security and Privacy Risks of Pre-Installed Applications | |
| Misra et al. | A privacy assessment of social media aggregators | |
| Ozbay et al. | Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications | |
| Mangset | Analysis of mobile application's compliance with the general data protection regulation (GDPR) | |
| Blessing et al. | Keydroid: A large-scale analysis of secure key storage in android apps | |
| Sandor et al. | An Entropy-based Method for Social Apps Privacy Assessment Using the Android Permissions Architecture | |
| Feal | “And all the pieces matter...” hybrid testing methods for android app’s privacy analysis |