Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Yeonjoon LeeTongxin LiNan ZhangSoteris DemetriouMingming ZhaXiaoFeng WangKai ChenXiao-yong ZhouXinhui HanMichael GracePublished in: DSN (2017)
Keyphrases
- security analysis
- mobile apps
- mobile applications
- android platform
- mobile platforms
- mobile devices
- smart card
- public key
- social networking
- fully functional
- security model
- smart phones
- high security
- security requirements
- image encryption
- security properties
- mobile phone
- encryption scheme
- authentication protocol
- software architecture
- authentication scheme
- user authentication
- data integration
- mutual authentication
- databases
- user experience