Author:
Vasilellis Efstratios,Gkionis Grigoris,Gritzalis Dimitris
Publisher
Springer Science and Business Media LLC
Reference60 articles.
1. Diamantaris, M., et al.: This sneaky piggy went to the android ad market: misusing mobile sensors for stealthy data exfiltration. In: Kim, Y., et al. (ed.) CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15–19, 2021, pp. 1065–1081. ACM (2021). https://doi.org/10.1145/3460120.3485366
2. Xie, N., et al.: Fingerprinting android malware families. Front. Comput. Sci. 13(3), 637–646 (2019). https://doi.org/10.1007/S11704-017-6493-Y
3. Tatyana, S., Anton, K.: IT threat evolution in Q3 2022. Mobile statistics. SecureList. https://securelist.com/it-threat-evolution-in-q3-2022-mobile-statistics/107978/%7D
4. Android. Application Sandbox. Android. https://source.android.com/docs/security/app-sandbox%7D
5. Android. Request runtime permissions. Android. https://developer.android.com/training/permissions/requesting%7D