Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2023
Demystifying Hidden Sensitive Operations in Android Apps
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 32, Issue 2Article No.: 50, Pages 1–30https://doi.org/10.1145/3574158Security of Android devices is now paramount, given their wide adoption among consumers. As researchers develop tools for statically or dynamically detecting suspicious apps, malware writers regularly update their attack mechanisms to hide malicious ...
- research-articleJanuary 2023
A Study of User Privacy in Android Mobile AR Apps
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 226, Pages 1–5https://doi.org/10.1145/3551349.3560512With the development of augmented reality (AR) technology, the use of mobile AR applications (MAR apps) is rising rapidly in various aspects of people’s everyday lives, such as games, shopping, and education. When compared to traditional apps, AR apps ...
- short-paperAugust 2019
White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis
SIGCOMM Posters and Demos '19: Proceedings of the ACM SIGCOMM 2019 Conference Posters and DemosPages 122–124https://doi.org/10.1145/3342280.3342330Privacy leaks from Netflix videos/movies are well researched. Current state-of-the-art works have been able to obtain coarse-grained information such as the genre and the title of videos by passive observation of encrypted traffic. However, leakage of ...
- research-articleJanuary 2019
PrivacyContext: identifying malicious mobile privacy leak using program context
International Journal of Information and Computer Security (IJICS), Volume 11, Issue 6Pages 562–584https://doi.org/10.1504/ijics.2019.103054Serious concerns have been raised about user's privacy leak in mobile apps, and many detection approaches are proposed. To evade detection, new mobile malware starts to mimic privacy-related behaviours of benign apps, and mix malicious privacy leak with ...
- research-articleNovember 2017
Analysis and Research on Combinatorial Attack of Android Platform Applications
ICCNS '17: Proceedings of the 2017 7th International Conference on Communication and Network SecurityPages 37–42https://doi.org/10.1145/3163058.3163066In recent years, scholars at home and abroad have carried out in-depth research and analysis on the combination attacks among Android platforms, but there are some deficiencies in the research results. Since inter application combination attacks involve ...
- research-articleApril 2015
Two-factor authentication: is the world ready?: quantifying 2FA adoption
EuroSec '15: Proceedings of the Eighth European Workshop on System SecurityArticle No.: 4, Pages 1–7https://doi.org/10.1145/2751323.2751327As text-based passwords continue to be the dominant form for user identification today, services try to protect their costumers by offering enhanced, and more secure, technologies for authentication. One of the most promising is two-factor ...
- research-articleMay 2013
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata
WWW '13: Proceedings of the 22nd international conference on World Wide WebPages 1191–1200https://doi.org/10.1145/2488388.2488492Twitter is a popular social network service for sharing messages among friends. Because Twitter restricts the length of messages, many Twitter users use URL shortening services, such as bit.ly and goo.gl, to share long URLs with friends. Some URL ...