-
2
-
-
80755159915
-
-
Android Developers. Manifest.permission. http://developer.android.com/ reference/android/Manifest.permission.html, 2010.
-
(2010)
Manifest.permission
-
-
-
5
-
-
70449642762
-
Tempest in a teapot: Compromising reflections revisited
-
M. Backes, T. Chen, M. Durmuth, H. P. A. Lensch, and M. Welk. Tempest in a Teapot: Compromising Reflections Revisited. In Proceedings of the IEEE Symposium on Security and Privacy (OAKLAND), 2009.
-
(2009)
Proceedings of the IEEE Symposium on Security and Privacy (OAKLAND)
-
-
Backes, M.1
Chen, T.2
Durmuth, M.3
Lensch, H.P.A.4
Welk, M.5
-
6
-
-
84975609041
-
Acoustic side-channel attacks on printers
-
M. Backes, M. Duermuth, S. Gerling, M. Pinkal, and C. Sporleder. Acoustic Side-Channel Attacks on Printers. In Proceedings of the USENIX Security Symposium (SECURITY), 2010.
-
(2010)
Proceedings of the USENIX Security Symposium (SECURITY)
-
-
Backes, M.1
Duermuth, M.2
Gerling, S.3
Pinkal, M.4
Sporleder, C.5
-
13
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
L. Cai, S. Machiraju, and H. Chen. Defending Against Sensor-Sniffing Attacks on Mobile Phones. In Proceedings of ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld), 2009.
-
(2009)
Proceedings of ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld)
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
17
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
DOI 10.1109/MPRV.2004.21
-
D. Dagon, T. Martin, and T. Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4):11-15, October - December 2004. (Pubitemid 40010893)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
23
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
-
(2010)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.N.7
-
28
-
-
79958252883
-
The war against trucks aerial interdiction in southern laos 1968-1972
-
Washington, DC
-
B. C. Nalty. The War Against Trucks Aerial Interdiction in Southern Laos 1968-1972. Office of Air Force History, Washington, DC, 2005.
-
(2005)
Office of Air Force History
-
-
Nalty, B.C.1
-
29
-
-
80755172945
-
-
National Security Agency. TEMPEST. http://www.nsa.gov/public-info/files/ cryptologic-spectrum/tempest.pdf, 2007.
-
(2007)
Tempest
-
-
-
30
-
-
0014568991
-
IEEE recommended practices for speech quality measurements
-
I. S. on Subjective Measurements
-
I. S. on Subjective Measurements. Ieee recommended practices for speech quality measurements. IEEE Transactions on Audio and Electroacoustics, 17:227-46, 1969.
-
(1969)
IEEE Transactions on Audio and Electroacoustics
, vol.17
, pp. 227-246
-
-
-
32
-
-
79959466110
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the ISOC Network and Distributed Systems Security (NDSS) Symposium, 2011.
-
(2011)
Proceedings of the ISOC Network and Distributed Systems Security (NDSS) Symposium
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
34
-
-
0025383421
-
Threat of information theft by reception of electromagnetic radiation from RS-232 cables
-
DOI 10.1016/0167-4048(90)90157-O
-
P. Smulders. The Threat of Information Theft by Reception of Electromagnetic Radiation from RS-232 Cables. Computers and Security, 9(1):53-58, 1990. (Pubitemid 20658244)
-
(1990)
Computers and Security
, vol.9
, Issue.1
, pp. 53-58
-
-
Smulders Peter1
-
37
-
-
80755172942
-
-
T. Thomas. Malware on the Move. http://mobile-security-software-review. toptenreviews.com/malware-on-the-move.html, 2008.
-
(2008)
Malware on the Move
-
-
Thomas, T.1
-
38
-
-
79955803340
-
From mobile phones to responsible devices
-
To Appear
-
P. Traynor, C. Amrutkar, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta. From Mobile Phones to Responsible Devices. Journal of Security and Communication Networks (SCN), To Appear 2011.
-
(2011)
Journal of Security and Communication Networks (SCN)
-
-
Traynor, P.1
Amrutkar, C.2
Rao, V.3
Jaeger, T.4
Mcdaniel, P.5
La Porta, T.6
-
41
-
-
80755159909
-
-
www.st.com. Lis331dlh July
-
www.st.com. Lis331dlh. http://www.st.com/stonline/products/literature/ds/ 15094.pdf, July 2009.
-
(2009)
-
-
|