Android Security

User Comfort with Android Background Resource Accesses in Different Contexts

User Interactions and Permission Use on Android

Passe-Partout:A General Collection Methodology for Android Devices

All Your Droids are Belong to Us: A Survey of Current Android Attacks