Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

N Zhang, X Mi, X Feng, XF Wang… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …

The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

Cloak and dagger: from two permissions to complete control of the UI feedback loop

Y Fratantonio, C Qian, SP Chung… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
The effectiveness of the Android permission system fundamentally hinges on the user's
correct understanding of the capabilities of the permissions being granted. In this paper, we …

Understanding and mitigating the security risks of voice-controlled third-party skills on amazon alexa and google home

N Zhang, X Mi, X Feng, XF Wang, Y Tian… - arxiv preprint arxiv …, 2018 - arxiv.org
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …

Phishing attacks on modern android

S Aonzo, A Merlo, G Tavella, Y Fratantonio - Proceedings of the 2018 …, 2018 - dl.acm.org
Modern versions of Android have introduced a number of features in the name of
convenience. This paper shows how two of these features, mobile password managers and …

No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps

E Liu, S Rao, S Havron, G Ho, S Savage… - Proceedings on …, 2023 - petsymposium.org
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …

Gui-squatting attack: Automated generation of android phishing apps

S Chen, L Fan, C Chen, M Xue, Y Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate
applications by leveraging repackaging or clone techniques, have caused varied yet …

Demystifying resource management risks in emerging mobile app-in-app ecosystems

H Lu, L **ng, Y **ao, Y Zhang, X Liao… - Proceedings of the …, 2020 - dl.acm.org
App-in-app is a new and trending mobile computing paradigm in which native app-like
software modules, called sub-apps, are hosted by popular mobile apps such as Wechat …

Understanding and detecting overlay-based android malware at market scales

Y Yan, Z Li, QA Chen, C Wilson, T Xu, E Zhai… - Proceedings of the 17th …, 2019 - dl.acm.org
As a key UI feature of Android, overlay enables one app to draw over other apps by creating
an extra View layer on top of the host View. While greatly facilitating user interactions with …

Truz-droid: Integrating trustzone with mobile operating system

K Ying, A Ahlawat, B Alsharifi, Y Jiang… - Proceedings of the 16th …, 2018 - dl.acm.org
Mobile devices today provide a hardware-protected mode called Trusted Execution
Environment (TEE) to help protect users from a compromised OS and hypervisor. Today TEE …