RE-Mind: a First Look Inside the Mind of a Reverse Engineer | 0 | 0.34 | 2022 |
On The Insecurity Of Sms One-Time Password Messages Against Local Attackers In Modern Mobile Devices | 1 | 0.37 | 2021 |
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization | 0 | 0.34 | 2021 |
Preventing And Detecting State Inference Attacks On Android | 1 | 0.35 | 2021 |
Tarnhelm - Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. | 1 | 0.35 | 2021 |
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting | 0 | 0.34 | 2019 |
Exploring Syscall-Based Semantics Reconstruction Of Android Applications | 0 | 0.34 | 2019 |
Understanding Linux Malware | 5 | 0.45 | 2018 |
Phishing Attacks on Modern Android. | 2 | 0.36 | 2018 |
Broken Fingers: On the Usage of the Fingerprint API in Android. | 2 | 0.36 | 2018 |
Guardion: Practical Mitigation Of Dma-Based Rowhammer Attacks On Arm | 14 | 0.53 | 2018 |
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. | 9 | 0.48 | 2017 |
Bootstomp: On The Security Of Bootloaders In Mobile Devices | 4 | 0.51 | 2017 |
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop | 14 | 0.58 | 2017 |
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. | 1 | 0.35 | 2017 |
On the Privacy and Security of the Ultrasound Ecosystem. | 3 | 0.48 | 2017 |
RETracer: triaging crashes by reverse execution from partial memory dumps. | 12 | 0.49 | 2016 |
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. | 24 | 0.73 | 2016 |
TriggerScope: Towards Detecting Logic Bombs in Android Applications | 29 | 0.80 | 2016 |
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. | 71 | 2.02 | 2016 |
BareDroid: Large-Scale Analysis of Android Apps on Real Devices | 22 | 0.71 | 2015 |
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users | 6 | 0.41 | 2015 |
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android | 14 | 0.58 | 2015 |
What the App is That? Deception and Countermeasures in the Android User Interface | 44 | 1.40 | 2015 |
CLAPP: characterizing loops in Android applications (invited talk) | 0 | 0.34 | 2015 |
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications | 6 | 0.41 | 2015 |
CLAPP: characterizing loops in Android applications | 11 | 0.57 | 2015 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. | 58 | 1.34 | 2015 |
Ten Years of iCTF: The Good, The Bad, and The Ugly. | 15 | 1.39 | 2014 |
ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors | 11 | 0.76 | 2014 |
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. | 104 | 2.99 | 2014 |
An empirical study of cryptographic misuse in android applications | 147 | 5.15 | 2013 |
Shellzer: a tool for the dynamic analysis of malicious shellcode | 7 | 0.50 | 2011 |