Toward Proactive Mobile Tracking Management

2014 ◽  
Vol 8 (4) ◽  
pp. 26-43 ◽  
Author(s):  
Hella Kaffel Ben Ayed ◽  
Asma Hamed

This paper presents an experimental study on mobile Web and mobile applications tracking. The study on Mobile Web tracking has been conducted on datasets collected by TrackScoreMobile, a Firefox add-on that has been developed and distributed to a set of Tunisian students and researchers. Results identify the factors that increase the privacy risk. The study on mobile applications tracking focuses on the permissions required by android applications. The findings point out on the mostly required permissions and the mostly tracked application categories. The originality of this work is summarized as follows: 1) identification and measurement of the parameters to quantify Web tracking, 2) identification of risky association between mobile applications permissions and associations between permissions and tracking components. The goal of this paper is to better understand how trackers rely on tracking components and on permissions for the purpose of tracking mobile users.

2009 ◽  
pp. 1937-1945
Author(s):  
Pankaj Kamthan

The increasing affordability of devices, advantages associated with a device always being handy while not being dependent on its location, and being able to tap into a wealth of information/ services has brought a new paradigm to mobile users. Indeed, the mobile Web promises the vision of universality: access (virtually) anywhere, at any time, on any device, and to anybody. However, with these vistas comes the realization that the users of the mobile applications and their context vary in many different ways: personal preferences, cognitive/neurological and physiological ability, age, cultural background, and variations in computing environment (device, platform, user agent) deployed. These pose a challenge to the ubiquity of mobile applications and could present obstacles to their proliferation. This chapter is organized as follows. We first provide the motivation and background necessary for later discussion. This is followed by introduction of a framework within which accessibility of mobile applications can be systematically addressed and thereby improved. This framework is based on the notions from semiotics and quality engineering, and aims to be practical. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Author(s):  
Panjak Kamthan

The increasing affordability of devices, advantages associated with a device always being handy while not being dependent on its location, and being able to tap into a wealth of information/services has brought a new paradigm to mobile users. Indeed, the mobile Web promises the vision of universality: access (virtually) anywhere, at any time, on any device, and to anybody. However, with these vistas comes the realization that the users of the mobile applications and their context vary in many different ways: personal preferences, cognitive/neurological and physiological ability, age, cultural background, and variations in computing environment (device, platform, user agent) deployed. These pose a challenge to the ubiquity of mobile applications and could present obstacles to their proliferation. This article is organized as follows. We first provide the motivation and background necessary for later discussion. This is followed by introduction of a framework within which accessibility of mobile applications can be systematically addressed and thereby improved. This framework is based on the notions from semiotics and quality engineering, and aims to be practical. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Author(s):  
Dimitris Geneiatakis ◽  
Charalabos Medentzidis ◽  
Ioannis Kounelis ◽  
Gary Steri ◽  
Igor Nai Fovino

2011 ◽  
Vol 8 (3) ◽  
pp. 70-100 ◽  
Author(s):  
Xu Yang ◽  
Athman Bouguettaya ◽  
Xumin Liu

In this paper, the authors propose novel access methods and a multi-channel organization for mobile users to effectively access composite M-services in wireless broadcast networks. The authors first propose a broadcast-based infrastructure to address the challenges of efficient usages of composite M-services. They then define a few semantics for accessing broadcast based M-services and discuss the strategies of efficiently accessing M-services based on the semantics. The authors also propose several channel organization that are suitable for the broadcast-based M-service structure and provide analytical models for them. They conduct a comprehensive experimental study on the proposed access methods.


2019 ◽  
Vol 11 (2) ◽  
pp. 1-21 ◽  
Author(s):  
Kavita Sharma ◽  
B. B. Gupta

Android-based devices easily fall prey to an attack due to its free availability in the android market. These Android applications are not certified by the legitimate organization. If the user cannot distinguish between the set of permissions requested by an application and its risk, then an attacker can easily exploit the permissions to propagate malware. In this article, the authors present an approach for privacy risk analysis in Android applications using machine learning. The proposed approach can analyse and identify the malware application permissions. Here, the authors achieved high accuracy and improved F-measure through analyzing the proposed method on the M0Droid dataset and completed testing on an extensive test set with malware from the Androzoo dataset and benign applications from the Drebin dataset.


2021 ◽  
Vol 7 (4(40)) ◽  
pp. 3-10
Author(s):  
Vladimir Iurievich Ananev

The article deals with the development of automated tests utilizing the WebDriver Protocol. The WebDriver and Appium technologies are analyzed, that allow implementation of automated tests of Android applications at the level of the graphical interface on the .NET platform. The most useful patterns in the development of GUI tests are investigated. The project architecture is proposed, which allows you to simply develop reliable and supported automated tests of mobile applications on the .NET platform.


2019 ◽  
Vol 12 (1) ◽  
pp. 12
Author(s):  
Hussain Mohammad Abu-Dalbouh

Much of the adjunct technology developed for using among medical environments is targeted towards computers. Because the hospitals face increasing demands to participate in a very big selection of quality improvement activities, the role and influence of using mobile applications in these efforts is additionally increasing. The professionals of Healthcare pay abundant of their time wandering between offices and patients, whereas the validator technology stays stationary. This paper presents a study performed using the mobile application for storing and following up patients status. Therefore, mobile application for tracking patient progress is proposed to minimize such challenges and demands, by allowing physicians and nurses to trace the patients’ conditions a lot of expeditiously and simply. The experimental results conclude that the working environment would be improved by supporting the mobile workers with mobile technology.


2019 ◽  
Author(s):  
Eman K. Elsayed ◽  
Kamal A. ElDahshan ◽  
Enas E. El-Sharawy ◽  
Naglaa E. Ghannam

Background: Portable applications (Android applications) are becoming increasingly complicated by mind-boggling programming frameworks. Applications must be produced rapidly and advance persistently in order to fit new client requirements and execution settings. However, catering to these imperatives may bring about poor outline decisions on design choices, known as anti-patterns, which may possibly corrupt programming quality and execution. Thus, the automatic detection of anti-patterns is a vital process that facilitates both maintenance and evolution tasks. Additionally, it guides developers to refactor their applications and consequently enhance their quality. Methods: We propose a reverse-engineering approach to analyze Android applications and detect the anti-patterns from mobile apps. We validate the effectiveness of our approach on a set of popular mobile apps such as YouTube, Whats App, Play Store and Twitter. The result of our approach produced an Android app with fewer anti-patterns, leading the way for perfect long-time apps and ensuring that these applications are purely valid. Results: The proposed method is a general detection method. It detected a set of semantic and structural design anti-patterns which have appeared 1262 times in mobile apps. The results showed that there was a correlation between the anti-patterns detected by an ontology editor and OntoUML editor. The results also showed that using ontology increases the detection percentage approximately 11.3%, guarantees consistency and decreases accuracy of anti-patterns in the new ontology.


Information ◽  
2019 ◽  
Vol 10 (10) ◽  
pp. 326 ◽  
Author(s):  
Amr Amin ◽  
Amgad Eldessouki ◽  
Menna Tullah Magdy ◽  
Nouran Abdeen ◽  
Hanan Hindy ◽  
...  

The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rush to release” as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy. The code is available through a GitHub repository for public contribution.


Sign in / Sign up

Export Citation Format

Share Document