Toward engineering a secure android ecosystem: A survey of existing techniques
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
Inferring user routes and locations using zero-permission mobile sensors
Leakage of user location and traffic patterns is a serious security threat with significant
implications on privacy as reported by recent surveys and identified by the US Congress …
implications on privacy as reported by recent surveys and identified by the US Congress …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
A study of security isolation techniques
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …
forms of attacks. This article seeks to understand existing security isolation techniques by …
On demystifying the android application framework:{Re-Visiting} android permission specification analysis
In contrast to the Android application layer, Android's application framework's internals and
their influence on the platform security and user privacy are still largely a black box for us. In …
their influence on the platform security and user privacy are still largely a black box for us. In …
Sok: Lessons learned from android security research for appified software platforms
Android security and privacy research has boomed in recent years, far outstrip**
investigations of other appified platforms. However, despite this attention, research efforts …
investigations of other appified platforms. However, despite this attention, research efforts …
Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART}
It's an essential step to understand malware's behaviors for develo** effective solutions.
Though a number of systems have been proposed to analyze Android malware, they have …
Though a number of systems have been proposed to analyze Android malware, they have …
Secloak: Arm trustzone-based mobile peripheral control
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
many scenarios. Journalists want to reliably turn off radios to protect their sources during …
Artist: The android runtime instrumentation and security toolkit
With the introduction of Android 5 Lollipop, the Android Runtime (ART) superseded the
Dalvik Virtual Machine (DVM) by introducing ahead-of-time compilation and native …
Dalvik Virtual Machine (DVM) by introducing ahead-of-time compilation and native …
A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one
billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary …
billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary …