NIST SP 800-163r1: Vetting the Security of Mobile Applications

Ensuring mobile app security is essential for organizations. The National Institute of Standards and Technology (NIST) 800-163r1 Special Publication outlines a standardized approach to evaluating and improving mobile application security. Download now for a detailed security vetting framework.
Resilient & Scalable Cloned App Detection Using Forced Execution & Compression Trees

Cloned apps pose major security threats. This research introduces a scalable detection method using forced execution and compression trees to identify clones efficiently. A must-read for cybersecurity professionals combating app fraud and malware. Download now to learn more.
A Longitudinal Study of Android Inter-App Vulnerabilities

Inter-app vulnerabilities are a persistent security risk. This study tracks their evolution over time, revealing trends and risks that impact millions of Android users. Essential for security researchers and developers looking to strengthen app defenses. Download now to stay ahead of emerging threats.
An Evaluation of Android Carrier Devices: Security & Performance

How secure are carrier-branded Android devices? This evaluation examines vulnerabilities, performance metrics, and carrier-specific risks. Download now for a comprehensive security analysis.
Kryptowire Discovers Mobile Phone Firmware that Transmitts PII Without User Consent

Unauthorized data collection is a growing concern. This investigation by Quokka (formerly Kryptowire) reveals mobile firmware that secretly transmitted personal data without user knowledge. Download now to learn about these privacy risks and how to mitigate them.
Resurrecting the READ_LOGS Permission on Samsung Devices

Samsung devices have long restricted log access—until now. This Quokka study examines how the READ_LOGS permission was unintentionally revived, exposing security implications. Download now for key insights into Android permission vulnerabilities.
Analysis of Content Copyright Infringement in Mobile Application Markets

As mobile streaming grows, so does the risk of copyright infringement. This study investigates the prevalence of pirated content in mobile application markets, revealing how unauthorized apps profit through illicit streaming. The research analyzes over 4 million apps across iOS, Android, and Windows, exposing how pirated content is distributed through cyber-lockers and back-end servers.
Forced-Path Execution for Android Applications on x86 Platforms

Forced-Path Execution for Android Applications on x86 Platforms explores a powerful analysis technique for uncovering vulnerabilities in Android apps running on x86 architectures. Learn how forced-path execution enhances security testing and malware detection. A must-read for researchers and security professionals. Download now to deepen your understanding of Android security.
Exposing Security Risks for Commercial Mobile Devices

Consumer-grade mobile devices are not immune to security risks. This report uncovers critical vulnerabilities affecting widely used commercial devices and provides recommendations for improved security. Download now to stay informed.