Watch Out for Race Condition Attacks When Using Android External Storage.
Shaoyong DuXin LiuGuoqing LaiXiangyang LuoPublished in: CCS (2022)
Keyphrases
- countermeasures
- sufficient conditions
- storage requirements
- storage and retrieval
- mobile devices
- data storage
- malicious users
- security threats
- storage devices
- random access
- detect malicious
- traffic analysis
- storage management
- malware detection
- processing capabilities
- internal and external
- watermarking scheme
- storage space
- java card
- smart phones
- attack detection
- mobile applications
- data corruption
- mobile robot