Techniques to detect data leakage in mobile applications

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Abstract

The popularity of mobile devices has skyrocketed over the past few years and has consequently given rise to various attacks in mobile platforms. The most serious among these threats is data leakage as most devices store sensitive information about their users, including location, bank information, to list a few. There have been a large number of data leakage detection proposals for mobile platforms, and a number of researches have looked at specific aspects of the mobile environment and used several techniques to provide protection. This survey provides an analysis of the data leakage problem, explains what it is, what kind of data it can expose, and the main techniques that have been used to circumvent this problem. It also looks at these various individual efforts and grouped them into categories. We also discuss the strengths and shortcomings of these efforts. Finally, some future works and opportunities of research are presented.

Index Terms

Techniques to detect data leakage in mobile applications Index terms have been assigned to the content through auto-classification.

Recommendations

Mobile cloud applications: opportunities, challenges and directions

MobileCloud '13: Proceedings of the first international workshop on Mobile cloud computing & networking

The use of smartphones and tablets is set to surpass the use of PCs for Internet access, media experiences, and social networking. Recognizing the growing "bring your own device" trend, enterprises are increasingly embracing the use of multi-platform .

Development Platforms for Mobile Applications: Status and Trends

Mobile devices are increasingly accepted as suitable media for multimedia-rich applications. Software firms have started promoting programming platforms and tools tailored to satisfy the requirements of mobile device users, developers, and resource .

The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications

The proliferation of mobile devices such as smart phones and other handheld appliances has stimulated the development of a broad range of functionality, including medical, retail, gaming, and personal applications. Technology that has been leveraged to .