NIST SP 800-163r1: Vetting the Security of Mobile Applications

Ensuring mobile app security is essential for organizations. The National Institute of Standards and Technology (NIST) 800-163r1 Special Publication outlines a standardized approach to evaluating and improving mobile application security. Download now for a detailed security vetting framework.

A Longitudinal Study of Android Inter-App Vulnerabilities

Inter-app vulnerabilities are a persistent security risk. This study tracks their evolution over time, revealing trends and risks that impact millions of Android users. Essential for security researchers and developers looking to strengthen app defenses. Download now to stay ahead of emerging threats.

Resurrecting the READ_LOGS Permission on Samsung Devices

Samsung devices have long restricted log access—until now. This Quokka study examines how the READ_LOGS permission was unintentionally revived, exposing security implications. Download now for key insights into Android permission vulnerabilities.

Analysis of Content Copyright Infringement in Mobile Application Markets

As mobile streaming grows, so does the risk of copyright infringement. This study investigates the prevalence of pirated content in mobile application markets, revealing how unauthorized apps profit through illicit streaming. The research analyzes over 4 million apps across iOS, Android, and Windows, exposing how pirated content is distributed through cyber-lockers and back-end servers.

Forced-Path Execution for Android Applications on x86 Platforms

Forced-Path Execution for Android Applications on x86 Platforms explores a powerful analysis technique for uncovering vulnerabilities in Android apps running on x86 architectures. Learn how forced-path execution enhances security testing and malware detection. A must-read for researchers and security professionals. Download now to deepen your understanding of Android security.

Exposing Security Risks for Commercial Mobile Devices

Consumer-grade mobile devices are not immune to security risks. This report uncovers critical vulnerabilities affecting widely used commercial devices and provides recommendations for improved security. Download now to stay informed.