Login / Signup

Launching Generic Attacks on iOS with Approved Third-Party Applications.

Jin HanSu Mon KyweQiang YanFeng BaoRobert H. DengDebin GaoYingjiu LiJianying Zhou
Published in: ACNS (2013)
Keyphrases
  • third party
  • personal information
  • sensitive information
  • countermeasures
  • mashup
  • watermarking algorithm
  • database
  • evolutionary algorithm
  • reverse logistics
  • watermarking scheme
  • private information
  • security mechanisms