How we found these vulnerabilities in android applications

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid growth of application markets, many developers now spend their time and money to develop new smartphone applications, bringing ever more intelligent applications to smartphone users. However, the rapid development process of applications without full testing made them neglect the security of the applications. In this paper, I took UC Browser and Mobile QQ as examples to show some vulnerabilities.

Cite

CITATION STYLE

APA

Ma, B. (2015). How we found these vulnerabilities in android applications. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 153, pp. 399–406). Springer Verlag. https://doi.org/10.1007/978-3-319-23802-9_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free