User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies.
Junsung ChoDayeon KimHyoungshick KimPublished in: IEEE Consumer Electron. Mag. (2018)
Keyphrases
- mobile applications
- malicious users
- user interface
- user authentication
- mobile apps
- end users
- user preferences
- development tools
- user interaction
- semi automatic
- user experience
- collaborative filtering
- mobile platforms
- recommender systems
- mobile devices
- android platform
- android application
- countermeasures
- social networking
- user model
- fully automatic
- user queries