Provided by: Athens University of Economics and Business
Date Added: Nov 2012
Smartphone users increasingly download and install third-party applications from official application repositories. Attackers may use this centralized application delivery architecture as a security and privacy attack vector. This risk increases since application vetting mechanisms are often not in place and the user is delegated to authorize which functionality and protected resources are accessible by third-party applications. In this paper, the authors mount a survey to explore the security awareness of Smartphone users who download applications from official application repositories (e.g. Google Play, Apple's App Store, etc.).