2015
DOI: 10.1155/2015/369489
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing User Awareness of Privacy Data Leak in Mobile Applications

Abstract: To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT) era, a cloud computing provides an effective platform without human intervention to build a resource-oriented security solution. However, existing malware detection methods are constrained by a vague situation of information leaks. The main goal of this paper is to measure a degree of hiding intention for the mobile application (app) to keep its leaking activity invisible to the user. For real-world applicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
14
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 13 publications
0
14
0
1
Order By: Relevance
“…Smartphone have become omnipresent personal computing platforms for users to access Internet services whenever and wherever. Recent surveys [ 1 , 2 ] show that as more and more private information and security information are stored in smartphones (e.g., 92.8% of Android smartphone users store private information in their smartphones), the risk of information leakage is becoming a major concern for the information society [ 3 ]. The most common mechanism to address this problem is authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Smartphone have become omnipresent personal computing platforms for users to access Internet services whenever and wherever. Recent surveys [ 1 , 2 ] show that as more and more private information and security information are stored in smartphones (e.g., 92.8% of Android smartphone users store private information in their smartphones), the risk of information leakage is becoming a major concern for the information society [ 3 ]. The most common mechanism to address this problem is authentication.…”
Section: Introductionmentioning
confidence: 99%
“…POWER CONSUMPTION UNDER FOUR DIFFERENT SCENARIOS. To measure the battery consumption, we consider the following four testing scenarios:(1) Phone is locked (i.e., not being used) and SmarterYou is off. (2) Phone is locked and SmarterYou keeps running.…”
mentioning
confidence: 99%
“…Malicious code can wreak havoc on IoT and mobile devices [7]. The functioning of installed applications in mobile devices will also be negatively affected in the form of data breaches or privacy leakage.…”
Section: Introductionmentioning
confidence: 99%