Login / Signup
Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
Zikan Dong
Tianming Liu
Jiapeng Deng
Haoyu Wang
Li Li
Minghui Yang
Meng Wang
Guosheng Xu
Guoai Xu
Published in:
USENIX Security Symposium (2024)
Keyphrases
</>
third party
data storage
source code
information flow
mobile devices
sensitive information
private information
decision making
mashup
reverse logistics
databases
multi objective
visual basic