Research Article
How We Found These Vulnerabilities in Android Applications
239 downloads
@INPROCEEDINGS{10.1007/978-3-319-23802-9_32, author={Bin Ma}, title={How We Found These Vulnerabilities in Android Applications}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II}, proceedings_a={SECURECOMM}, year={2015}, month={12}, keywords={Vulnerabilities UC browser Mobile QQ Smartphone security}, doi={10.1007/978-3-319-23802-9_32} }
- Bin Ma
Year: 2015
How We Found These Vulnerabilities in Android Applications
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23802-9_32
Abstract
With the rapid growth of application markets, many developers now spend their time and money to develop new smartphone applications, bringing ever more intelligent applications to smartphone users. However, the rapid development process of applications without full testing made them neglect the security of the applications. In this paper, I took UC Browser and Mobile QQ as examples to show some vulnerabilities.
Copyright © 2014–2024 ICST