Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …
on the voice channel to communicate with their users, which however is known to be …
The android platform security model
R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …
set of use cases encompassing communication, navigation, media consumption …
Cloak and dagger: from two permissions to complete control of the UI feedback loop
The effectiveness of the Android permission system fundamentally hinges on the user's
correct understanding of the capabilities of the permissions being granted. In this paper, we …
correct understanding of the capabilities of the permissions being granted. In this paper, we …
Understanding and mitigating the security risks of voice-controlled third-party skills on amazon alexa and google home
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …
on the voice channel to communicate with their users, which however is known to be …
Phishing attacks on modern android
Modern versions of Android have introduced a number of features in the name of
convenience. This paper shows how two of these features, mobile password managers and …
convenience. This paper shows how two of these features, mobile password managers and …
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
Gui-squatting attack: Automated generation of android phishing apps
Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate
applications by leveraging repackaging or clone techniques, have caused varied yet …
applications by leveraging repackaging or clone techniques, have caused varied yet …
Demystifying resource management risks in emerging mobile app-in-app ecosystems
App-in-app is a new and trending mobile computing paradigm in which native app-like
software modules, called sub-apps, are hosted by popular mobile apps such as Wechat …
software modules, called sub-apps, are hosted by popular mobile apps such as Wechat …
Understanding and detecting overlay-based android malware at market scales
As a key UI feature of Android, overlay enables one app to draw over other apps by creating
an extra View layer on top of the host View. While greatly facilitating user interactions with …
an extra View layer on top of the host View. While greatly facilitating user interactions with …
Truz-droid: Integrating trustzone with mobile operating system
Mobile devices today provide a hardware-protected mode called Trusted Execution
Environment (TEE) to help protect users from a compromised OS and hypervisor. Today TEE …
Environment (TEE) to help protect users from a compromised OS and hypervisor. Today TEE …