Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Outline of the examined apps.

More »

Table 1 Expand

Fig 1.

Overview of the followed methodology.

More »

Fig 1 Expand

Table 2.

Overview of requested permissions per app vis-à-vis the baseline.

More »

Table 2 Expand

Table 3.

TLS server security level rating of external URLs per app.

More »

Table 3 Expand

Table 4.

Categorisation of sensitive API calls discovered in the apps.

More »

Table 4 Expand

Table 5.

Potentially privacy-invasive API call groups per app.

More »

Table 5 Expand

Table 6.

Potential weaknesses and other security issues per app.

More »

Table 6 Expand

Table 7.

Potentially vulnerable components in the manifest file of each app.

More »

Table 7 Expand

Table 8.

Shared library issues per app.

More »

Table 8 Expand

Table 9.

Outdated third-party software components per app.

More »

Table 9 Expand

Fig 2.

Issues identified through taint analysis.

More »

Fig 2 Expand

Table 10.

Dynamic analysis results.

More »

Table 10 Expand