Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications
Abstract
References
Index Terms
- Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications
Recommendations
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
WWW '17: Proceedings of the 26th International Conference on World Wide WebWith the prevalence of smartphones, app markets such as Apple App Store and Google Play has become the center stage in the mobile app ecosystem, with millions of apps developed by tens of thousands of app developers in each major market. This paper ...
Cross-Compiling Android Applications to iOS and Windows Phone 7
Android is currently leading the smartphone segment in terms of market share since its introduction in 2007. Android applications are written in Java using an API designed for mobile apps. Other smartphone platforms, such as Apple's iOS or Microsoft's ...
Cross-compiling Android applications to the iPhone
PPPJ '10: Proceedings of the 8th International Conference on the Principles and Practice of Programming in JavaSmartphones such as Android-based devices and Apple's iPhone have become popular platforms for mobile applications. In particular, they allow the development of native applications that can take advantage of special purpose hardware such as ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Badges
Distinguished Paper
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Key Research and Development Program of China
- National Natural Science Foundation of China
- Shanghai Rising-Star Program
- Shanghai Pilot Program for Basic Research- Fudan University
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 531Total Downloads
- Downloads (Last 12 months)531
- Downloads (Last 6 weeks)46
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in