Learn More
copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Please cite this paper as: Mylonas A., Kastania A., Gritzalis D., " Delegate the smartphone user? Security awareness in smartphone platforms "(More)
most cases, these works may not be reposted without the explicit permission of the copyright holder. Abstract: The adoption of smartphones, devices transforming from simple communication devices to 'smart' and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, their enhanced functionality and their ability to host(More)
material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the(More)
The increasing presence of privacy violating apps in app marketplaces poses a significant privacy risk for smartphone users. Current approaches assessing privacy risk, lack user input, assuming that the value of each smartpho-ne sub-asset (e.g. contact list, usage history) is perceived similarly across users. Thus, per user privacy risk assessment is not(More)
The proliferation of smartphones has introduced new challenges in web browsing security. These devices often have limited resources and small size , which may limit the security 'arsenal' of their user. This, however, does not seem to deter smartphone users from accessing the Web via their devices. On the same time, the popularity of browser-based exploits(More)