DHS Automated Vetting Process for Mobile Apps Could Cut Costs

Manual security testing is time-consuming and expensive. Learn how the Department of Homeland Security’s automated vetting process streamlines mobile app security, reducing costs while improving efficiency. Read the full report now.
Automating NIAP Requirements Testing for Mobile Apps

Ensuring the security of IT products is critical for national security. This DHS report examines NIAP’s role in testing and certifying secure technology. Download now for insights into federal cybersecurity standards.
Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware

Pre-installed apps on Android devices often come with privileged access, making them potential security risks. This study introduces FIRMSCOPE, an automated tool that scans Android firmware to detect privilege-escalation vulnerabilities. Analyzing over 330,000 apps across 2,000 firmware images, the research uncovers critical security flaws that allow unauthorized access to sensitive user data, device controls, and system functions.
NIST SP 800-163r1: Vetting the Security of Mobile Applications

Ensuring mobile app security is essential for organizations. The National Institute of Standards and Technology (NIST) 800-163r1 Special Publication outlines a standardized approach to evaluating and improving mobile application security. Download now for a detailed security vetting framework.
Resilient & Scalable Cloned App Detection Using Forced Execution & Compression Trees

Cloned apps pose major security threats. This research introduces a scalable detection method using forced execution and compression trees to identify clones efficiently. A must-read for cybersecurity professionals combating app fraud and malware. Download now to learn more.
A Longitudinal Study of Android Inter-App Vulnerabilities

Inter-app vulnerabilities are a persistent security risk. This study tracks their evolution over time, revealing trends and risks that impact millions of Android users. Essential for security researchers and developers looking to strengthen app defenses. Download now to stay ahead of emerging threats.
An Evaluation of Android Carrier Devices: Security & Performance

How secure are carrier-branded Android devices? This evaluation examines vulnerabilities, performance metrics, and carrier-specific risks. Download now for a comprehensive security analysis.
Kryptowire Discovers Mobile Phone Firmware that Transmitts PII Without User Consent

Unauthorized data collection is a growing concern. This investigation by Quokka (formerly Kryptowire) reveals mobile firmware that secretly transmitted personal data without user knowledge. Download now to learn about these privacy risks and how to mitigate them.
Resurrecting the READ_LOGS Permission on Samsung Devices

Samsung devices have long restricted log access—until now. This Quokka study examines how the READ_LOGS permission was unintentionally revived, exposing security implications. Download now for key insights into Android permission vulnerabilities.