Learn More
Currently, in the smartphone market, Android is the platform with the highest share. Due to this popularity and also to its open source nature, Android-based smartphones are now an ideal target for attackers. Since the number of malware designed for Android devices is increasing fast, Android users are looking for security solutions aimed at preventing(More)
Android users can face the risk of downloading and installing bad applications on their devices. In fact, many applications may either hide malware, or their expected behavior do not fully follow the user's expectation. This happens because, at install-time, even if the user is warned with the potential security threat of the application, she often skips(More)
The Bring Your Own Device (BYOD) paradigm, where the employees of a company install an application on their mobile devices to access company privileged information, is becoming very popular in the business environment. In order to perform their tasks, BYOD applications typically require a large set of rights which, in Android mobile devices, must be(More)
The Quality of Information (QoI) in Participatory Sensing (PS) systems largely depends on the location accuracy of participating users. However, users could easily provide false information through Location Spoofing Attacks (LSA). Existing PS systems are not able to efficiently validate the position of users in large-scale outdoor environments, thus being(More)