2016
DOI: 10.1007/978-3-319-45744-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Application Impersonation Detection Using Dynamic User Interface Extraction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(29 citation statements)
references
References 28 publications
0
29
0
Order By: Relevance
“…An impersonation attack might cause a serious breach of network security as it allows unauthorized or malicious users to access the network [41]. Some researchers proposed new detectors particularly for an impersonation attack [42], [43], [41], [44], [45] and [46]. Malisa et al [42] proposed a mobile application, which can detect both whole and partial user interface impersonations.…”
Section: Impersonation Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…An impersonation attack might cause a serious breach of network security as it allows unauthorized or malicious users to access the network [41]. Some researchers proposed new detectors particularly for an impersonation attack [42], [43], [41], [44], [45] and [46]. Malisa et al [42] proposed a mobile application, which can detect both whole and partial user interface impersonations.…”
Section: Impersonation Attackmentioning
confidence: 99%
“…Some researchers proposed new detectors particularly for an impersonation attack [42], [43], [41], [44], [45] and [46]. Malisa et al [42] proposed a mobile application, which can detect both whole and partial user interface impersonations. We agree that the concept of extracting features captures important information to detect an attack.…”
Section: Impersonation Attackmentioning
confidence: 99%
“…An automated screenshot mechanism is proposed in both [16,15] to find similarities between apps and determine whether a UI attack is being made by an app.…”
Section: Discussionmentioning
confidence: 99%
“…It re-executes all the unit test cases every time when a piece of code is changed. As an example, Hu et al [84] have applied unit testing to [26] CRASHSCOPE [27] MAMBA [28] Pretect [29] DroidMate [93] SSDA [30] TrimDroid [8] ERVA [9] Clapp et al [10] SAPIENZ [11] RacerDroid [31] Baek et al [94] DiagDroid [32] MobiPlay [95] MOTIF [33] DRUN [34] DroidDEV [96] GAT [35] Zhang et al [36] Jabbarvand et al [37] Qian et al [38] Ermuth et al [39] Cadage [97] Zhang et al [40] Zhang et al [41] dLens [42] Sonny et al [98] Packeviius et al [43] SIG-Droid [99] Knorr et al [44] TAST [100] IntentDroid [45] Griebe et al [101] Farto et al [46] Bielik et al [47] MobiGUITAR [48] AGRippin [102] Aktouf et al [49] THOR [103] AppAudit [50] Morgado et al [104] Hassanshahi et al [51] iMPAcT [52] Deng et al [53] Espada et al…”
Section: Which Test Levels Are Addressed?mentioning
confidence: 99%
“…Table 5 summarises the aforementioned test phases, where the most recurrently applied testing phase is system testing (accounting for nearly 80% of the selected publications), followed by unit testing and integration testing, respectively. [26] CRASHSCOPE [27] MAMBA [28] Pretect [29] DroidMate [93] SSDA [30] TrimDroid [8] ERVA [9] Clapp et al [10] SAPIENZ [11] RacerDroid [31] Baek et al [94] DiagDroid [32] MobiPlay [95] MOTIF [33] DRUN [34] DroidDEV [96] GAT [35] Zhang et al [36] Jabbarvand et al [37] Qian et al [38] Ermuth et al [39] Cadage [97] Zhang et al [40] Zhang et al [41] dLens [42] Sonny et al [98] Packeviius et al…”
Section: Which Test Levels Are Addressed?mentioning
confidence: 99%