+

Ozbay et al., 2022 - Google Patents

Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications

Ozbay et al., 2022

View PDF
Document ID
9711468687307725340
Author
Ozbay A
Bicakci K
Publication year
Publication venue
An Analysis and Scoring System for Pre-Installed Applications

External Links

Snippet

Most users have no idea that their Android devices are equipped with many pre-installed applications which have the capability of tracking and monitoring them. Although applications coming pre-installed pose a great danger to user security and privacy, they …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Similar Documents

Publication Publication Date Title
Gamba et al. An analysis of pre-installed android software
US12120519B2 (en) Determining a security state based on communication with an authenticity server
Kollnig et al. Are iphones really better for privacy? comparative study of ios and android apps
Reardon et al. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
US11336458B2 (en) Evaluating authenticity of applications based on assessing user device context for increased security
Feal et al. Angel or devil? a privacy study of mobile parental control apps
Reyes et al. “Won’t somebody think of the children?” examining COPPA compliance at scale
US9940454B2 (en) Determining source of side-loaded software using signature of authorship
Agarwal et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing
US10789594B2 (en) Method and system to intelligently assess and mitigate security risks on a mobile device
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Calciati et al. Automatically granted permissions in Android apps: An empirical study on their prevalence and on the potential threats for privacy
Wang et al. Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications
Alenezi et al. Abusing android permissions: A security perspective
Orjiude et al. A multilateral privacy impact analysis method for android applications
Liu et al. Android mobile OS snooping by Samsung, Xiaomi, Huawei and Realme handsets
Liu et al. On the data privacy practices of Android OEMs
Štefanko Android stalkerware vulnerabilities
Özbay et al. Should Users Trust Their Android Devices? A Scoring System for Assessing Security and Privacy Risks of Pre-Installed Applications
Misra et al. A privacy assessment of social media aggregators
Ozbay et al. Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications
Mangset Analysis of mobile application's compliance with the general data protection regulation (GDPR)
Blessing et al. Keydroid: A large-scale analysis of secure key storage in android apps
Sandor et al. An Entropy-based Method for Social Apps Privacy Assessment Using the Android Permissions Architecture
Feal “And all the pieces matter...” hybrid testing methods for android app’s privacy analysis
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载