Taming Information-Stealing Smartphone Applications (on Android)

  title={Taming Information-Stealing Smartphone Applications (on Android)},
  author={Yajin Zhou and Xinwen Zhang and Xuxian Jiang and Vincent W. Freeh},
Smartphones have been becoming ubiquitous and mobile users are increasingly relying on them to store and handle personal information. However, recent studies also reveal the disturbing fact that users’ personal information is put at risk by (rogue) smartphone applications. Existing solutions exhibit limitations in their capabilities in taming these privacy-violating smartphone applications. In this paper, we argue for the need of a new privacy mode in smartphones. The privacy mode can empower… CONTINUE READING
Highly Influential
This paper has highly influenced 24 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 374 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 229 extracted citations

Data-Sluice: Fine-grained traffic control for Android application

2016 IEEE Symposium on Computers and Communication (ISCC) • 2016
View 5 Excerpts
Highly Influenced

Enhancing User Privacy on Android Mobile Devices via Permissions Removal

2014 47th Hawaii International Conference on System Sciences • 2014
View 6 Excerpts
Highly Influenced

A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems

2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops • 2013
View 9 Excerpts
Highly Influenced

374 Citations

Citations per Year
Semantic Scholar estimates that this publication has 374 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 12 references

PiOS: Detecting Privacy Leaks in iOS Applications

View 4 Excerpts
Highly Influenced

Language-based security on Android

PLAS • 2009
View 3 Excerpts
Highly Influenced

On lightweight mobile phone application certification

ACM Conference on Computer and Communications Security • 2009
View 3 Excerpts
Highly Influenced

App Attack: Surviving the Explosive Growth of Mobile Apps

Kevin Mahaffey, John Hering
View 1 Excerpt

Google Android: A Comprehensive Security Assessment

IEEE Security & Privacy • 2010
View 1 Excerpt

Similar Papers

Loading similar papers…