All your app links are belong to us: understanding the threats of instant apps based attacks.
Yutian TangYulei SuiHaoyu WangXiapu LuoHao ZhouZhou XuPublished in: ESEC/SIGSOFT FSE (2020)
Keyphrases
- computer games
- countermeasures
- security threats
- denial of service attacks
- malicious attacks
- mobile applications
- insider attacks
- mobile apps
- cyber attacks
- security breaches
- android platform
- computer security
- security vulnerabilities
- third party
- security issues
- link analysis
- buffer overflow
- data corruption
- sql injection
- social networks
- injection attacks
- identity theft
- mobile platforms
- watermarking algorithm
- watermarking scheme
- network security
- network traffic
- context aware