Skip to content

Latest commit

 

History

History
48 lines (43 loc) · 3.43 KB

Mobile security and privacy.md

File metadata and controls

48 lines (43 loc) · 3.43 KB

Mobile security and privacy

keywords: Android, mobie device, IoT, AI, social nerwork

Oakland

  • (2018) SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through C
  • (2018) Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types
  • (2017) IoT Goes Nuclear: Creating a Zigbee Chain Reaction
  • (2017) SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices
  • (2016) No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
  • (2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms
  • (2015) Effective Real-time Android Application Auditing
  • (2015) What the App is That? Deception and Countermeasures in the Android User Interface
  • (2015) Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android

CCS

  • (2017) Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers
  • (2017) DolphinAttack: Inaudible Voice Commands
  • (2017) walk2friends: Inferring Social Links from Mobility Profiles
  • (2017) Vulnerable Implicit Service: A Revisit
  • (2017) Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android
  • (2017) A Stitch in Time: Supporting Android Developers in Writing Secure Code
  • (2017) Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews
  • (2016) Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback
  • (2016) The Misuse of Android Unix Domain Sockets and Security Implications
  • (2016) Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android
  • (2016) TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
  • (2016) Statistical Deobfuscation of Android Applications
  • (2016) Reliable Third-Party Library Detection in Android and its Security Applications
  • (2016) SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
  • (2016) Computational Soundness for Dalvik Bytecode
  • (2016) Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
  • (2016) When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
  • (2015) Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS X and iOS
  • (2015) iRiS: Vetting Private API Abuse in iOS Applications
  • (2015) GUITAR: Piecing Together Android App GUIs from Memory Images
  • (2015) VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
  • (2015) Towards Automatic Generation of Security-Centric Descriptions for Android Apps
  • (2015) From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application
  • (2015) AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications
  • (2015) Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
  • (2015) Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations
  • (2015) When Good Becomes Evil: Keystroke Inference with Smartwatch
  • (2012) CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

OSDI

  • (2010) TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones