Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services.
Sojhal Ismail KhanDominika C. WoszczykChengzeng YouSoteris DemetriouMuhammad NaveedPublished in: ACSAC (2021)
Keyphrases
- location aware
- context aware
- mobile environments
- mobile services
- mobile commerce
- mobile networks
- mobile applications
- computing environments
- mobile phone
- security risks
- mobile peer to peer
- smart phones
- service providers
- ubiquitous computing
- web services
- health monitoring systems
- value added services
- context aware services
- mobile devices
- communication technologies
- service oriented
- mobile computing
- mobile users
- service management
- mobile payment
- mobile technologies
- mobile learning
- mobile phone users
- pervasive computing
- mobile terminals
- end users
- internet services
- location information
- context aware systems
- agent technology
- information services
- service composition
- mobile clients
- wireless devices
- mobile objects
- wireless internet
- m learning
- wireless networks