Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.
(2011). Analyzing inter-application communication in
android. In Proceedings of the 9th international con-
ference on Mobile systems, applications, and services,
pages 239–252. ACM.
Felt, A. P. and Wagner, D. (2011). Phishing on mobile de-
vices. In Proceedings of the Web 2.0 Security and Pri-
vacy 2011 Workshop.
Fernandes, E., Chen, Q. A., Paupore, J., Essl, G., Halder-
man, J. A., Mao, Z. M., and Prakash, A. (2016). An-
droid ui deception revisited: Attacks and defenses. In
International Conference on Financial Cryptography
and Data Security, pages 41–59. Springer.
Flurry Analytics. U.s. consumers time-
spent on mobile crosses 5 hours a day.
http://flurrymobile.tumblr.com/post/157921590345/us-
consumers-time-spent-on-mobile-crosses-5. Ac-
cessed on 01/09/2017.
Fratantonio, Y., Qian, C., Chung, S., and Lee, W. (2017).
Cloak and Dagger: From Two Permissions to Com-
plete Control of the UI Feedback Loop. In Proceed-
ings of the IEEE Symposium on Security and Privacy
(Oakland), San Jose, CA.
Heartfield, R. and Loukas, G. (2016). A taxonomy of at-
tacks and a survey of defence mechanisms for seman-
tic social engineering attacks. ACM Computing Sur-
veys (CSUR), 48(3):37.
Malisa, L., Kostiainen, K., and Capkun, S. (2017). Detect-
ing mobile application spoofing attacks by leveraging
user visual similarity perception. In Proceedings of
the Seventh ACM on Conference on Data and Appli-
cation Security and Privacy, pages 289–300. ACM.
Malisa, L., Kostiainen, K., Och, M., and Capkun, S. (2016).
Mobile application impersonation detection using dy-
namic user interface extraction. In European Sympo-
sium on Research in Computer Security, pages 217–
237. Springer.
Marforio, C., Jayaram Masti, R., Soriente, C., Kostiainen,
K., and
ˇ
Capkun, S. (2016). Evaluation of personalized
security indicators as an anti-phishing mechanism for
smartphone applications. In Proceedings of the 2016
CHI Conference on Human Factors in Computing Sys-
tems, pages 540–551. ACM.
Niemietz, M. and Schwenk, J. (2012). Ui redressing attacks
on android devices. Black Hat Abu Dhabi.
Pielot, M., Church, K., and de Oliveira, R. (2014). An in-
situ study of mobile phone notifications. In Proceed-
ings of the 16th International Conference on Human-
computer Interaction with Mobile Devices & Ser-
vices, MobileHCI ’14, pages 233–242, New York, NY,
USA. ACM.
Ren, C., Liu, P., and Zhu, S. (2017). Windowguard: Sys-
tematic protection of gui security in android. In Net-
work and Distributed System Security Symposium.
StatCounter GlobalStats. Mobile and tablet internet
usage exceeds desktop for first time worldwide.
http://gs.statcounter.com/press/mobile-and-tablet-
internet-usage-exceeds-desktop-for-first-time-
worldwide. Accessed on 01/09/2017.
Urban Airship. New urban airship study re-
veals app publishers that dont message users
waste 95 percent of their acquisition spend.
https://www.urbanairship.com/company/press-
releases/new-urban-airship-mobile-app-retention-
study. Accessed on 01/09/2017.
Virvilis, N., Tsalis, N., Mylonas, A., and Gritzalis, D.
(2014). Mobile devices: A phisher’s paradise. In Se-
curity and Cryptography (SECRYPT), 2014 11th In-
ternational Conference on, pages 1–9. IEEE.
Wei, F., Li, Y., Roy, S., Ou, X., and Zhou, W. (2017).
Deep ground truth analysis of current android mal-
ware. In International Conference on Detection of In-
trusions and Malware, and Vulnerability Assessment,
pages 252–276. Springer.
Wu, L., Brandt, B., Du, X., and Ji, B. (2016a). Analysis of
clickjacking attacks and an effective defense scheme
for android devices. In Communications and Network
Security (CNS), 2016 IEEE Conference on, pages 55–
63. IEEE.
Wu, L., Du, X., and Wu, J. (2016b). Effective defense
schemes for phishing attacks on mobile computing
platforms. IEEE Transactions on Vehicular Technol-
ogy, 65(8):6678–6691.
Xu, Z. and Zhu, S. (2012). Abusing notification services
on smartphones for phishing and spamming. In Pro-
ceedings of the 6th USENIX conference on Offensive
Technologies, pages 1–1. USENIX Association.
Ying, L., Cheng, Y., Lu, Y., Gu, Y., Su, P., and Feng, D.
(2016a). Attacks and defence on android free floating
windows. In Proceedings of the 11th ACM on Asia
Conference on Computer and Communications Secu-
rity, ASIA CCS ’16, pages 759–770, New York, NY,
USA. ACM.
Ying, L., Cheng, Y., Lu, Y., Gu, Y., Su, P., and Feng, D.
(2016b). Attacks and defence on android free floating
windows. In Proceedings of the 11th ACM on Asia
Conference on Computer and Communications Secu-
rity, pages 759–770. ACM.
ZDNet. Whatsapp: Now one billion peo-
ple send 55 billion messages per day.
http://www.zdnet.com/article/whatsapp-now-one-
billion-people-send-55-billion-messages-per-day/.
Accessed on 27/07/2017.
Knock-Knock: The Unbearable Lightness of Android Notifications
61