ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android
暂无分享,去创建一个
Yanick Fratantonio | Wenke Lee | Andrea Lanzi | Andrea Possemato | Simon Pak Ho Chung | Wenke Lee | S. Chung | A. Lanzi | Y. Fratantonio | Andrea Possemato
[1] Baptiste Gourdin. Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization Attacks , 2010, WOOT.
[2] A. Porter. Phishing on Mobile Devices , 2011 .
[3] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[4] Zhuoqing Morley Mao,et al. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks , 2014, USENIX Security Symposium.
[5] Yulong Zhang,et al. Towards Discovering and Understanding Task Hijacking in Android , 2015, USENIX Security Symposium.
[6] Christopher Krügel,et al. What the App is That? Deception and Countermeasures in the Android User Interface , 2015, 2015 IEEE Symposium on Security and Privacy.
[7] Srdjan Capkun,et al. Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception , 2017, IACR Cryptol. ePrint Arch..
[8] Xiangyu Zhang,et al. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.
[9] Xiaofeng Wang,et al. UIPicker: User-Input Privacy Identification in Mobile Applications , 2015, USENIX Security Symposium.
[10] Dan Grossman,et al. AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems , 2016, CCS.
[11] Xiaojiang Du,et al. Analysis of clickjacking attacks and an effective defense scheme for Android devices , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[12] Atul Prakash,et al. Android UI Deception Revisited: Attacks and Defenses , 2016, Financial Cryptography.
[13] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[14] Yanick Fratantonio,et al. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[15] Dengfeng Li,et al. UiRef: analysis of sensitive user inputs in Android applications , 2017, WISEC.
[16] Sencun Zhu,et al. WindowGuard: Systematic Protection of GUI Security in Android , 2017, NDSS.
[17] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).