-
1
-
-
84901808968
-
Keystrokes inference attack on Android: A comparative evaluation of sensors and their fusion
-
A. Al-Haiqi, M. Ismail, and R. Nordin. Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion. Journal of ICT Research and Applications, 7(2):117-136, 2013.
-
(2013)
Journal of ICT Research and Applications
, vol.7
, Issue.2
, pp. 117-136
-
-
Al-Haiqi, A.1
Ismail, M.2
Nordin, R.3
-
3
-
-
84920120480
-
-
Android Developers
-
Android Developers. Android KitKat. https://developer.android.com/about/versions/kitkat.html.
-
Android KitKat
-
-
-
4
-
-
84937551980
-
-
Android Developers
-
Android Developers. Camera. http://developer.android.com/reference/android/hardware/Camera.html.
-
Camera
-
-
-
5
-
-
84879853132
-
-
Android Developers
-
Android Developers. Sensors Overview. http://developer.android.com/guide/topics/sensors/sensorsffoverview.html.
-
Sensors Overview
-
-
-
7
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith. Smudge Attacks on Smartphone Touch Screens. In USENIX Conference on Offensive Technologies (WOOT), pages 1-7, 2010.
-
(2010)
USENIX Conference on Offensive Technologies (WOOT)
, pp. 1-7
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
8
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith. Practicality of Accelerometer Side Channels on Smartphones. In Annual Computer Security Applications Conference (ACSAC), pages 41-50, 2012.
-
(2012)
Annual Computer Security Applications Conference (ACSAC)
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
9
-
-
70449642762
-
Tempest in a teapot: Compromising reections revisited
-
M. Backes, T. Chen, M. Dürmuth, H. P. A. Lensch, and M.Welk. Tempest in a Teapot: Compromising Reections Revisited. In IEEE Symposium on Security and Privacy, pages 315-327, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 315-327
-
-
Backes, M.1
Chen, T.2
Dürmuth, M.3
Lensch, H.P.A.4
Welk, M.5
-
11
-
-
84874435442
-
AppGuard - Enforcing user requirements on Android apps
-
M. Backes, S. Gerling, C. Hammer, M. Maffei, and P. von-Styp-Rekowsky. AppGuard - Enforcing User Requirements on Android Apps. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pages 543-548, 2013.
-
(2013)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, pp. 543-548
-
-
Backes, M.1
Gerling, S.2
Hammer, C.3
Maffei, M.4
Von-Styp-rekowsky, P.5
-
12
-
-
84937606683
-
-
Barclays PLC
-
Barclays PLC. Mobile Banking Services. http://www.barclays.co.uk/Mobile/BarclaysPingit/P1242603570446.
-
Mobile Banking Services
-
-
-
13
-
-
80051969895
-
Mobile security catching Up? Revealing the nuts and bolts of the security of mobile devices
-
M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In IEEE Symposium on Security and Privacy, pages 96-111, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 96-111
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
15
-
-
84905652811
-
-
BlackBerry
-
BlackBerry. BlackBerry Balance. http://us.blackberry.com/business/software/blackberry-balance.html.
-
BlackBerry Balance
-
-
-
16
-
-
84937606684
-
-
BlackBerry
-
BlackBerry. BlackBerry Runtime 10.0. http://developer.blackberry.com/android/.
-
BlackBerry Runtime 10.0
-
-
-
17
-
-
84865812253
-
A birthday present every eleven wallets? The security of customer-chosen banking PINs
-
J. Bonneau, S. Preibusch, and R. Anderson. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In Financial Cryptography (FC), pages 25-40, 2012.
-
(2012)
Financial Cryptography (FC)
, pp. 25-40
-
-
Bonneau, J.1
Preibusch, S.2
Anderson, R.3
-
19
-
-
84863091977
-
On the practicality of motion based keystroke inference attack
-
L. Cai and H. Chen. On the Practicality of Motion Based Keystroke Inference Attack. In Trust and Trustworthy Com- puting (TRUST), pages 273-290, 2012.
-
(2012)
Trust and Trustworthy Com- Puting (TRUST)
, pp. 273-290
-
-
Cai, L.1
Chen, H.2
-
20
-
-
84923201020
-
Defending against sensor-Sniffng attacks on mobile phones
-
L. Cai, S. Machiraju, and H. Chen. Defending Against Sensor- Sniffng Attacks on Mobile Phones. In ACM SIGCOMM Work- shop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld), pages 31-36, 2009.
-
(2009)
ACM SIGCOMM Work- Shop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld)
, pp. 31-36
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
21
-
-
84937606686
-
-
DoMobile
-
DoMobile. AppLock. https://play.google.com/store/apps/details?id=com.domobile.applock.
-
AppLock
-
-
-
22
-
-
84937562674
-
-
Evernote Corporation
-
Evernote Corporation. Evernote. https://play.google.com/store/apps/details?id=com.evernote.
-
Evernote
-
-
-
23
-
-
80755187788
-
Android permissions demystiffed
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystiffed. In ACM Conference on Computer and Communications Security (CCS), pages 627-638, 2011.
-
(2011)
ACM Conference on Computer and Communications Security (CCS)
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
24
-
-
85044855162
-
How to ask for permission
-
A. P. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner. How to Ask for Permission. In USENIX Conference on Hot Topics in Security (HotSec), 2012.
-
(2012)
USENIX Conference on Hot Topics in Security (HotSec)
-
-
Felt, A.P.1
Egelman, S.2
Finifter, M.3
Akhawe, D.4
Wagner, D.5
-
25
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android Permissions: User Attention, Comprehension, and Behavior. In Symposium On Usable Privacy and Security (SOUPS), page 3, 2012.
-
(2012)
Symposium on Usable Privacy and Security (SOUPS)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
27
-
-
84863084209
-
Android leaks: Automatically Detecting potential privacy leaks in android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. In Trust and Trustworthy Computing (TRUST), pages 291-307, 2012.
-
(2012)
Trust and Trustworthy Computing (TRUST)
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
29
-
-
84863297774
-
Accomplice: Location inference using accelerometers on smartphones
-
J. Han, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location Inference using Accelerometers on Smartphones. In Communication Systems and Networks (COM- SNETS), pages 1-9, 2012.
-
(2012)
Communication Systems and Networks (COM- SNETS)
, pp. 1-9
-
-
Han, J.1
Owusu, E.2
Nguyen, L.T.3
Perrig, A.4
Zhang, J.5
-
31
-
-
84937606690
-
-
KeepSafe
-
KeepSafe. KeepSafe. https://play.google.com/store/apps/details?id=com.kii.safe.
-
KeepSafe
-
-
-
32
-
-
84868375110
-
A conundrum of permissions: Installing applications on an android smartphone
-
P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. M. Sadeh, and D. Wetherall. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography Workshops, pages 68-79, 2012.
-
(2012)
Financial Cryptography Workshops
, pp. 68-79
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
Sadeh, N.M.5
Wetherall, D.6
-
33
-
-
84943632039
-
Timing attacks on implementations of Diffe- Hellman, RSA, DSS, and Other Systems
-
P. C. Kocher. Timing Attacks on Implementations of Diffe- Hellman, RSA, DSS, and Other Systems. In Advances in Cryp- Tology (CRYPTO), pages 104-113, 1996.
-
(1996)
Advances in Cryp- Tology (CRYPTO)
, pp. 104-113
-
-
Kocher, P.C.1
-
35
-
-
80755143996
-
(sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
-
P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers. In ACM Conference on Computer and Communications Security (CCS), pages 551-562, 2011.
-
(2011)
ACM Conference on Computer and Communications Security (CCS)
, pp. 551-562
-
-
Marquardt, P.1
Verma, A.2
Carter, H.3
Traynor, P.4
-
36
-
-
8344266354
-
-
MathWorks
-
MathWorks. Statistics Toolbox. http://www.mathworks.com/products/statistics/.
-
Statistics Toolbox
-
-
-
37
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury. Tapprints: Your Finger Taps Have Fingerprints. In Mobile Systems, Applications, and Services (MobiSys), pages 323-336, 2012.
-
(2012)
Mobile Systems, Applications, and Services (MobiSys)
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
38
-
-
84937547844
-
-
NAB
-
NAB. NAB. https://play.google.com/store/apps/details?id=au.com.nab.mobile.
-
NAB
-
-
-
39
-
-
84860294696
-
Accessory: Password Inference using accelerometers on smartphones
-
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: Password Inference using Accelerometers on Smartphones. In Mobile Computing Systems and Applications (HotMobile), page 9, 2012.
-
(2012)
Mobile Computing Systems and Applications (HotMobile)
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
40
-
-
84869432690
-
Using probabilistic generative models for ranking risks of Android apps
-
H. Peng, C. S. Gates, B. P. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using Probabilistic Generative Models for Ranking Risks of Android Apps. In ACM Conference on Computer and Communications Security (CCS), pages 241- 252, 2012.
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
, pp. 241-252
-
-
Peng, H.1
Gates, C.S.2
Sarma, B.P.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
41
-
-
84874840847
-
User-Driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In IEEE Symposium on Security and Privacy, pages 224-238, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 224-238
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
44
-
-
84888998673
-
-
Samsung
-
Samsung. Samsung KNOX. http://www.samsung.com/global/business/mobile/solution/security/samsung-knox.
-
Samsung KNOX
-
-
-
47
-
-
84937606692
-
-
Solirify. Math Trainer. https://play.google.com/store/apps/details?id=com.solirify.mathgame.
-
Solirify. Math Trainer
-
-
-
49
-
-
84892175232
-
-
UK Offce of Communications
-
UK Offce of Communications. Communications Market Report 2013. http://media.ofcom.org.uk/2013/08/01/the-reinvention-of-the-1950s-living-room-2/, 2013.
-
(2013)
Communications Market Report 2013
-
-
-
50
-
-
84893332856
-
-
VirusTotal
-
VirusTotal. VirusTotal. https://play.google.com/store/apps/details?id=com.virustotal.
-
VirusTotal
-
-
|