Vecchiato et al., 2016 - Google Patents

The perils of Android security configuration

Vecchiato et al., 2016

Document ID
9509631558862514099
Author
Vecchiato D
Vieira M
Martins E
Publication year
Publication venue
Computer

External Links

Snippet

The Perils of Android Security Configuration Toggle navigation IEEE Computer Society Digital Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE Computer Society IEEE Computer Society Digital Library My Subscriptions Magazines Journals …
Continue reading at www.computer.org (other versions)

Similar Documents

Publication Publication Date Title
US10318729B2 (en) Privacy protection during insider threat monitoring
US12041067B2 (en) Behavior detection and verification
US9077747B1 (en) Systems and methods for responding to security breaches
US9043918B2 (en) System and method for profile based filtering of outgoing information in a mobile environment
US11775678B2 (en) Tagging and auditing sensitive information in a database environment
US11102245B2 (en) Deception using screen capture
US11947704B2 (en) Tagging and auditing sensitive information in a database environment
Do et al. Enhancing user privacy on android mobile devices via permissions removal
US10963583B1 (en) Automatic detection and protection against file system privilege escalation and manipulation vulnerabilities
US9154309B2 (en) Method and system for running encrypted files
US20170185790A1 (en) Dynamic management of protected file access
US9262646B1 (en) Systems and methods for managing web browser histories
Vecchiato et al. The perils of Android security configuration
Mohsen et al. Android keylogging threat
Sikder et al. A survey on android security: development and deployment hindrance and best practices
US20230267198A1 (en) Anomalous behavior detection with respect to control plane operations
US9571497B1 (en) Systems and methods for blocking push authentication spam
US11636219B2 (en) System, method, and apparatus for enhanced whitelisting
US20170187527A1 (en) Obtaining A Decryption Key From a Mobile Device
US9733852B2 (en) Encrypted synchronization
US9819663B1 (en) Data protection file system
Sharma et al. Smartphone security and forensic analysis
Saha et al. Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs
Keteku et al. Detection and Prevention of Malware in Android Mobile Devices: A Literature Review
US10747900B1 (en) Discovering and controlling sensitive data available in temporary access memory