Skip to main content

Showing 1–6 of 6 results for author: Gadient, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.03601  [pdf

    cs.CR cs.SE

    Security Header Fields in HTTP Clients

    Authors: Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: HTTP headers are commonly used to establish web communications, and some of them are relevant for security. However, we have only little information about the usage and support of security-relevant headers in mobile applications. We explored the adoption of such headers in mobile app communication by querying 9,714 distinct URLs that were used in 3,376 apps and collected each server's response inf… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)

  2. arXiv:2111.03596  [pdf, other

    cs.CR cs.HC

    Phish What You Wish

    Authors: Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: IT professionals have no simple tool to create phishing websites and raise the awareness of users. We developed a prototype that can dynamically mimic websites by using enriched screenshots, which requires no additional programming experience and is simple to set up. The generated websites are functional and remain up-to-date. We found that 98% of the hyperlinks in mimicked websites are functional… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021)

  3. Security Smells Pervade Mobile App Servers

    Authors: Pascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari

    Abstract: [Background] Web communication is universal in cyberspace, and security risks in this domain are devastating. [Aims] We analyzed the prevalence of six security smells in mobile app servers, and we investigated the consequence of these smells from a security perspective. [Method] We used an existing dataset that includes 9714 distinct URLs used in 3376 Android mobile apps. We exercised these URLs t… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2021)

  4. Security Smells in Android

    Authors: Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz

    Abstract: The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and privacy mechanisms, vulnerabilities continue to proliferate. Research has shown that many vulnerabilities are due to insecure programming practices. However, each study has often dealt with a specific issue, making… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)

  5. Web APIs in Android through the Lens of Security

    Authors: Pascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz

    Abstract: Web communication has become an indispensable characteristic of mobile apps. However, it is not clear what data the apps transmit, to whom, and what consequences such transmissions have. We analyzed the web communications found in mobile apps from the perspective of security. We first manually studied 160 Android apps to identify the commonly-used communication libraries, and to understand how the… ▽ More

    Submitted 1 June, 2020; v1 submitted 1 January, 2020; originally announced January 2020.

    Comments: 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). London, Ontario, Canada, February 18-21, 2020

  6. Security Code Smells in Android ICC

    Authors: Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz

    Abstract: Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps. To promote secure programming practices, we have reviewed related research, and identified avoidable ICC vulnerabilities in Android-run devices and the security code smells that indicate their prese… ▽ More

    Submitted 10 December, 2018; v1 submitted 30 November, 2018; originally announced November 2018.

    Comments: Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE), 2018