ABSTRACT
The introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, applications and services that fostered this new reality fundamentally altered the relationship between users and security and privacy. In this talk I map the scientific community's evolving efforts over the last decade in evaluating smart phone application security and privacy. I consider several key scientific questions and explore the methods and tools used to answer them. Through this exposition, I show how our joint understanding of adversary and industry practices have matured over time, and briefly consider how these results have informed and shaped technical public policy in the United States. I conclude with a discussion of the open problems and opportunities in mobile device security and privacy.
Index Terms
- Tracing the Arc of Smartphone Application Security
Recommendations
Tracing the Arc of Smartphone Application Security
SDN-NFVSec '17: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function VirtualizationThe introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, applications and services that ...
Tracing the Arc of Smartphone Application Security
ABAC '17: Proceedings of the 2nd ACM Workshop on Attribute-Based Access ControlThe introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, applications and services that ...
Mobile application security: Role of perceived privacy as the predictor of security perceptions
Highlights- Privacy-related perceptions affect security perception of the users.
- Perceived ...
AbstractDespite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved ...
Comments