The far side of mobile application integrated development environments

Conference paper


Lyvas, C, Pitropakis, N and Lambrinoudakis, C (2016). The far side of mobile application integrated development environments. 13th International Conference Trust, Privacy and Security in Digital Business. Porto, Portugal 07 - 08 Sep 2016 Springer. https://doi.org/10.1007/978-3-319-44341-6_8
AuthorsLyvas, C, Pitropakis, N and Lambrinoudakis, C
TypeConference paper
Abstract

© Springer International Publishing Switzerland 2016. Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, there are numerous software applications that utilize the high computational capabilities that they offer. This type of software is a vital part of what is known as e-Commerce, with a variety of business models proposed and implemented. Lately, a new era of free-ware mobile application has arisen with paid features and promoted content in them. Piracy is not only the weakest point of software’s financial ecosystem for conventional computing systems but also for smartphones. Actions like replication, redistribution and licensing violations can cause financial losses of colossal extent to their creators. Mobile applications also introduce the following peculiarity: They are distributed through predefined channels (Application Stores) owned by mobile operating system vendors such as Apple, Google and Microsoft. In this research we present several scenarios where cracked and modified applications can be freely used into every non jailbroken iOS device. Moreover it is demonstrated that not even in strict mobile environments, such as Apple’s, end-users should be considered as trusted entities from application developers by default.

Keywords08 Information And Computing Sciences; Artificial Intelligence & Image Processing
Year2016
JournalLecture Notes in Artificial Intelligence
PublisherSpringer
Journal citation9830 L, pp. 111-122
ISSN0302-9743
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-319-44341-6_8
Accepted author manuscript
License
File Access Level
Open
Publication dates
Print07 Sep 2016
Publication process dates
Deposited23 Feb 2018
Accepted01 Jan 2016
ISBN9783319443409
Permalink -

https://openresearch.lsbu.ac.uk/item/87260

Download files


Accepted author manuscript
10.1007_978-3-319-44341-6.pdf
License: CC BY 4.0
File access level: Open

  • 75
    total views
  • 234
    total downloads
  • 1
    views this month
  • 32
    downloads this month

Export as

Related outputs

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.
Chrysoulas, C and Pitropakis, N (2018). Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 4, pp. e4-e4. https://doi.org/10.4108/eai.10-1-2018.153551
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Pitropakis, N, Lyvas, C and Lambrinoudakis, C (2017). The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization. Athens 19 - 21 Feb 2017
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Kintis, P, Miramirkhani, N, Lever, C, Chen, Y, Romero-Gómez, R, Pitropakis, N, Nikiforakis, N and Antonakakis, M (2017). Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Association of Computer Machinery's Computer and Communications Security (ACM CCS) 2017. Dallas, Texas USA 30 Oct - 02 Nov 2017 https://doi.org/10.1145/3133956.3134002