Vecchiato et al., 2016 - Google Patents
The perils of Android security configurationVecchiato et al., 2016
- Document ID
- 9509631558862514099
- Author
- Vecchiato D
- Vieira M
- Martins E
- Publication year
- Publication venue
- Computer
External Links
Snippet
The Perils of Android Security Configuration Toggle navigation IEEE Computer Society Digital
Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE
Computer Society IEEE Computer Society Digital Library My Subscriptions Magazines Journals …
- 238000004458 analytical method 0 abstract description 5
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10318729B2 (en) | Privacy protection during insider threat monitoring | |
US12041067B2 (en) | Behavior detection and verification | |
US9077747B1 (en) | Systems and methods for responding to security breaches | |
US9043918B2 (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
US11775678B2 (en) | Tagging and auditing sensitive information in a database environment | |
US11102245B2 (en) | Deception using screen capture | |
US11947704B2 (en) | Tagging and auditing sensitive information in a database environment | |
Do et al. | Enhancing user privacy on android mobile devices via permissions removal | |
US10963583B1 (en) | Automatic detection and protection against file system privilege escalation and manipulation vulnerabilities | |
US9154309B2 (en) | Method and system for running encrypted files | |
US20170185790A1 (en) | Dynamic management of protected file access | |
US9262646B1 (en) | Systems and methods for managing web browser histories | |
Vecchiato et al. | The perils of Android security configuration | |
Mohsen et al. | Android keylogging threat | |
Sikder et al. | A survey on android security: development and deployment hindrance and best practices | |
US20230267198A1 (en) | Anomalous behavior detection with respect to control plane operations | |
US9571497B1 (en) | Systems and methods for blocking push authentication spam | |
US11636219B2 (en) | System, method, and apparatus for enhanced whitelisting | |
US20170187527A1 (en) | Obtaining A Decryption Key From a Mobile Device | |
US9733852B2 (en) | Encrypted synchronization | |
US9819663B1 (en) | Data protection file system | |
Sharma et al. | Smartphone security and forensic analysis | |
Saha et al. | Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs | |
Keteku et al. | Detection and Prevention of Malware in Android Mobile Devices: A Literature Review | |
US10747900B1 (en) | Discovering and controlling sensitive data available in temporary access memory |