2023
DOI: 10.1007/s12652-023-04535-7
|View full text |Cite
|
Sign up to set email alerts
|

Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 30 publications
0
0
0
Order By: Relevance
“…Information leakage can also occur when well-meaning individuals with privileged server access exchange information for legal causes [33,34]. As a result, increasing research emphasizes protecting personal information during the analytic process [35,36]. Federated learning (FL) potentially provides a solution for this privacy breach [37][38][39].…”
Section: Motivationmentioning
confidence: 99%
“…Information leakage can also occur when well-meaning individuals with privileged server access exchange information for legal causes [33,34]. As a result, increasing research emphasizes protecting personal information during the analytic process [35,36]. Federated learning (FL) potentially provides a solution for this privacy breach [37][38][39].…”
Section: Motivationmentioning
confidence: 99%
“…This includes the static and dynamic analysis of the apps and checking for any known malicious behavior. However, despite these measures, attackers find their way into the store [18,51,107]. There are several means by which attackers can upload and propagate malware through the Google Play Store, the details of which are as follows.…”
Section: Threats Through Google Play Storementioning
confidence: 99%
“…In recent years, the security landscape for mobile devices has changed dramatically, with attackers increasingly targeting these devices through side-channel attacks [16,17] and malware spread through the Google Play Store [18]. Although previous research has explored vulnerabilities and attacks against mobile devices, these studies often fail to address contemporary threats such as APTs, side-channel attacks, and attacks launched through the Google Play Store.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation