Privacy Leaks through Data Hijacking Attack on Mobile Systems
暂无分享,去创建一个
[1] Hang Zhang,et al. Android Root and its Providers: A Double-Edged Sword , 2015, CCS.
[2] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[3] Gonzalo Bailador,et al. Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.
[4] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[5] Duncan S. Wong,et al. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.
[6] Azizah Abdul Manaf,et al. Investigation of Touch-Based User Authentication Features Using Android Smartphone , 2014, AMLTA.
[7] Ahmad-Reza Sadeghi,et al. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .
[8] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[9] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[10] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[11] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[12] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[13] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.