Login / Signup
SPSM@CCS
2011
2016
2011
2016
Keyphrases
Publications
2016
Jakob Jakobsen
,
Claudio Orlandi
On the CCA (in)Security of MTProto.
SPSM@CCS
(2016)
Srishti Gupta
,
Payas Gupta
,
Mustaque Ahamad
,
Ponnurangam Kumaraguru
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
SPSM@CCS
(2016)
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016
SPSM@CCS
(2016)
Mansour Ahmadi
,
Battista Biggio
,
Steven Arzt
,
Davide Ariu
,
Giorgio Giacinto
Detecting Misuse of Google Cloud Messaging in Android Badware.
SPSM@CCS
(2016)
Shinjo Park
,
Altaf Shaik
,
Ravishankar Borgaonkar
,
Jean-Pierre Seifert
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones.
SPSM@CCS
(2016)
Damilola Orikogbo
,
Matthias Büchler
,
Manuel Egele
CRiOS: Toward Large-Scale iOS Application Analysis.
SPSM@CCS
(2016)
Elie Bursztein
,
Artem Malyshev
,
Tadek Pietraszek
,
Kurt Thomas
Picasso: Lightweight Device Class Fingerprinting for Web Clients.
SPSM@CCS
(2016)
Wei Liu
,
Yueqian Zhang
,
Zhou Li
,
Hai-Xin Duan
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps.
SPSM@CCS
(2016)
Hannah Quay-de la Vallee
,
Paige Selby
,
Shriram Krishnamurthi
On a (Per)Mission: Building Privacy Into the App Marketplace.
SPSM@CCS
(2016)
Claudio Marforio
,
Ramya Jayaram Masti
,
Claudio Soriente
,
Kari Kostiainen
,
Srdjan Capkun
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
SPSM@CCS
(2016)
Jan-Erik Ekberg
Hardware Isolation for Trusted Execution.
SPSM@CCS
(2016)
Christopher Thompson
,
David A. Wagner
Securing Recognizers for Rich Video Applications.
SPSM@CCS
(2016)
Martin Pfeiffer
,
Jan-Pascal Kwiotek
,
Jiska Classen
,
Robin Klose
,
Matthias Hollick
Analyzing TETRA Location Privacy and Network Availability.
SPSM@CCS
(2016)
Uri Kanonov
,
Avishai Wool
Secure Containers in Android: The Samsung KNOX Case Study.
SPSM@CCS
(2016)
Vincent F. Taylor
,
Ivan Martinovic
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis.
SPSM@CCS
(2016)
2015
Rebecca Balebako
,
Florian Schaub
,
Idris Adjerid
,
Alessandro Acquisti
,
Lorrie Faith Cranor
The Impact of Timing on the Salience of Smartphone App Privacy Notices.
SPSM@CCS
(2015)
Kobra Khanmohammadi
,
Mohammad Reza Rejali
,
Abdelwahab Hamou-Lhadj
Understanding the Service Life Cycle of Android Apps: An Exploratory Study.
SPSM@CCS
(2015)
Amir Rahmati
,
Harsha V. Madhyastha
Context-Specific Access Control: Conforming Permissions With User Expectations.
SPSM@CCS
(2015)
Yuan Tian
,
Bin Liu
,
Weisi Dai
,
Blase Ur
,
Patrick Tague
,
Lorrie Faith Cranor
Supporting Privacy-Conscious App Update Decisions with User Reviews.
SPSM@CCS
(2015)
Daniel R. Thomas
,
Alastair R. Beresford
,
Andrew C. Rice
Security Metrics for the Android Ecosystem.
SPSM@CCS
(2015)
San-Tsai Sun
,
Andrea Cuadros
,
Konstantin Beznosov
Android Rooting: Methods, Detection, and Evasion.
SPSM@CCS
(2015)
Le Yu
,
Tao Zhang
,
Xiapu Luo
,
Lei Xue
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications.
SPSM@CCS
(2015)
Alex Manea
The Past, Present and Future of Digital Privacy.
SPSM@CCS
(2015)
Antonio Bianchi
,
Yanick Fratantonio
,
Christopher Kruegel
,
Giovanni Vigna
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
SPSM@CCS
(2015)
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2015, Denver, Colorado, USA, October 12, 2015
SPSM@CCS
(2015)
Yihang Song
,
Urs Hengartner
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices.
SPSM@CCS
(2015)
2014
Yuan Ding
,
Sai Teja Peddinti
,
Keith W. Ross
Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery.
SPSM@CCS
(2014)
Wenrui Diao
,
Xiangyu Liu
,
Zhe Zhou
,
Kehuan Zhang
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
SPSM@CCS
(2014)
Saksham Varma
,
Robert J. Walls
,
Brian Lynn
,
Brian Neil Levine
Efficient Smart Phone Forensics Based on Relevance Feedback.
SPSM@CCS
(2014)
Timothy Vidas
,
Jiaqi Tan
,
Jay Nahata
,
Chaur Lih Tan
,
Nicolas Christin
,
Patrick Tague
A5: Automated Analysis of Adversarial Android Applications.
SPSM@CCS
(2014)
Steven Arzt
,
Stephan Huber
,
Siegfried Rasthofer
,
Eric Bodden
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
SPSM@CCS
(2014)
Raphael Spreitzer
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices.
SPSM@CCS
(2014)
Peng Ning
Samsung KNOX and Enterprise Mobile Security.
SPSM@CCS
(2014)
Zheng Wei
,
David Lie
LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes.
SPSM@CCS
(2014)
Mauro Conti
,
Earlence Fernandes
,
Justin Paupore
,
Atul Prakash
,
Daniel Simionato
OASIS: Operational Access Sandboxes for Information Security.
SPSM@CCS
(2014)
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014
SPSM@CCS
(2014)
Tim Cooijmans
,
Joeri de Ruiter
,
Erik Poll
Analysis of Secure Key Storage Solutions on Android.
SPSM@CCS
(2014)
Steffen Lortz
,
Heiko Mantel
,
Artem Starostin
,
Timo Bähr
,
David Schneider
,
Alexandra Weber
Cassandra: Towards a Certifying App Store for Android.
SPSM@CCS
(2014)
Adrian Dabrowski
,
Katharina Krombholz
,
Johanna Ullrich
,
Edgar R. Weippl
QR Inception: Barcode-in-Barcode Attacks.
SPSM@CCS
(2014)
2013
Theodore Book
,
Dan S. Wallach
A case of collusion: a study of the interface between ad libraries and their apps.
SPSM@CCS
(2013)
Federico Maggi
,
Andrea Valdi
,
Stefano Zanero
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors.
SPSM@CCS
(2013)
Shijia Pan
,
An Chen
,
Pei Zhang
Securitas: user identification through RGB-NIR camera pair on mobile devices.
SPSM@CCS
(2013)
Stephen Doswell
,
Nauman Aslam
,
David Kendall
,
Graham Sexton
Please slow down!: the impact on tor performance from mobility.
SPSM@CCS
(2013)
S. M. Taiabul Haque
,
Matthew K. Wright
,
Shannon Scielzo
Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets.
SPSM@CCS
(2013)
James Sellwood
,
Jason Crampton
Sleeping android: the danger of dormant permissions.
SPSM@CCS
(2013)
Laurent Simon
,
Ross J. Anderson
PIN skimmer: inferring PINs through the camera and microphone.
SPSM@CCS
(2013)
Jon A. Geater
Security composition in the real world: squaring the circle of mobile security with contemporary device economics.
SPSM@CCS
(2013)
Shuying Liang
,
Andrew W. Keep
,
Matthew Might
,
Steven Lyde
,
Thomas Gilray
,
Petey Aldous
,
David Van Horn
Sound and precise malware analysis for android via pushdown reachability and entry-point saturation.
SPSM@CCS
(2013)
Rafael Fedler
,
Marcel Kulicke
,
Julian Schütte
Native code execution control for attack mitigation on android.
SPSM@CCS
(2013)
Adam Skillen
,
David Barrera
,
Paul C. van Oorschot
Deadbolt: locking down android disk encryption.
SPSM@CCS
(2013)