-
1
-
-
84986544610
-
SANS institute
-
viewed 17th July 2105
-
[1] Johnson, K., Jardine, K., SANS institute. Mob. Appl. Secur. Surv., 2013 viewed 17th July 2105 http://www.sans.org/reading-room/whitepapers/analyst/2013-mobile-application-security-survey-35080.
-
(2013)
Mob. Appl. Secur. Surv.
-
-
Johnson, K.1
Jardine, K.2
-
2
-
-
84986633572
-
-
(), Threats to Mobile Apps in the Wild. (accessed 17.07.15).
-
[2] ARXAN (2013), Threats to Mobile Apps in the Wild. https://www.arxan.com/wp-content/uploads/2015/01/Threats_to_Mobile_Apps_in_the_Wild_v0.3.pdf (accessed 17.07.15).
-
(2013)
-
-
-
3
-
-
84898003401
-
Identifying back doors, attack points, and surveillance mechanisms in iOS devices
-
[3] Zdziarski, J., Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Digit. Investig. 11:1 (2014), 3–19.
-
(2014)
Digit. Investig.
, vol.11
, Issue.1
, pp. 3-19
-
-
Zdziarski, J.1
-
4
-
-
84986621020
-
-
(), HHP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack, (accessed 17.07.15).
-
[4] HP (2013), HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack, http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865 (accessed 17.07.15).
-
(2013)
-
-
-
5
-
-
84986574264
-
-
(), iOS Security, (accessed 17.07.15).
-
[5] Apple (2015), iOS Security, https://www.apple.com/business/docs/iOS_Security_Guide.pdf (accessed 17.07.15).
-
(2015)
-
-
-
6
-
-
84986574263
-
-
(), Apple CommonCryptor Open Source, (accessed 17.07.15).
-
[6] Apple (2006), Apple CommonCryptor Open Source, http://www.opensource.apple.com/source/CommonCrypto/CommonCrypto-36064/CommonCrypto/CommonCryptor.h (accessed 17.07.15).
-
(2006)
-
-
-
7
-
-
84986621024
-
-
(), CCCrypt Mac Developer Library Reference, (accessed 17.07.15).
-
[7] Apple (2007), CCCrypt Mac Developer Library Reference, https://developer.apple.com/library/ios/documentation/System/Conceptual/ManPages_iPhoneOS/man3/CCCrypt.3cc.html (accessed 17.07.15).
-
(2007)
-
-
-
8
-
-
84986582445
-
-
(), CCHmac Mac Developer Library Reference, (accessed 17.07.15).
-
[8] Apple (2007), CCHmac Mac Developer Library Reference, https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man3/CCHmac.3cc.html (accessed 17.07.15).
-
(2007)
-
-
-
9
-
-
84986594434
-
-
(), CFString CoreFoundation Framework Reference, (accessed 17.07.15).
-
[9] Apple (2012), CFString CoreFoundation Framework Reference, https://developer.apple.com/library/mac/documentation/CoreFoundation/Reference/CFStringRef/Reference/reference.html (accessed 17.07.15).
-
(2012)
-
-
-
10
-
-
84986574238
-
-
(), TLS heartbeat read overrun (CVE-2014-0160), (accessed 17.07.15).
-
[10] OpenSSL Security Advisory (2014), TLS heartbeat read overrun (CVE-2014-0160), http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 (accessed 17.07.15).
-
(2014)
-
-
-
11
-
-
84986574251
-
-
OWASP. Certificate and Public Key Pinning, (accessed 17.07.15).
-
[11] J. Walton and J. Steven, OWASP (2014), Certificate and Public Key Pinning, https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning (accessed 17.07.15).
-
(2014)
-
-
Walton, J.1
Steven, J.2
-
12
-
-
84986541778
-
Forbes
-
Evasi0n Is The Most Popular Jailbreak Ever, (accessed 17.07.15).
-
[12] A. Greenberg, Forbes (2013), Evasi0n Is The Most Popular Jailbreak Ever, http://www.forbes.com/sites/andygreenberg/2013/02/08/evasi0n-is-the-most-popular-jailbreak-ever-nearly-seven-million-ios-devices-hacked-in-four-days/ (accessed 17.07.15).
-
(2013)
-
-
Greenberg, A.1
-
13
-
-
84949105226
-
The Mobile Application Market
-
accessed 17.07.15).
-
[13] J. Svanberg, B. Insight (2013), The Mobile Application Market, http://www.berginsight.com/ReportPDF/ProductSheet/bi-app1-ps.pdf (accessed 17.07.15).
-
(2013)
-
-
Svanberg, J.1
Insight, B.2
-
14
-
-
84986593416
-
-
(), Marble Labs Mobile threat Report, (accessed 17.07.15).
-
[14] Marble Security (2014), Marble Labs Mobile threat Report, http://www.marblesecurity.com/wp-content/uploads/2015/06/MS_App-Threat-Report_June-2014.pdf (accessed 17.07.15).
-
(2014)
-
-
-
16
-
-
84906743353
-
Jekyll on iOS: When benign apps become evil
-
[16] Wang, T., Lu, K., Lu, L., Chang, S., Lee, W., Jekyll on iOS: When benign apps become evil. Proceedings of Twenty-second USENIX Conference on Security, 2013, 559–572.
-
(2013)
Proceedings of Twenty-second USENIX Conference on Security
, pp. 559-572
-
-
Wang, T.1
Lu, K.2
Lu, L.3
Chang, S.4
Lee, W.5
-
17
-
-
78649242475
-
Transport Layer Security (TLS) Renegotiation Indication Extension
-
RFC 5746, (accessed 17.07.15).
-
[17] E. Rescorla, M. Ray, S. Dispensa, and N. Oskov (2010), Transport Layer Security (TLS) Renegotiation Indication Extension, http://tools.ietf.org/html/rfc5746 RFC 5746, (accessed 17.07.15).
-
(2010)
-
-
Rescorla, E.1
Ray, M.2
Dispensa, S.3
Oskov, N.4
-
18
-
-
84986593054
-
-
(), Hackers use ‘Find My iPhone’ to lockout, ransom Mac and iOS device owners in Australia, (accessed 17.07.15).
-
[18] Apple Insider (2014), Hackers use ‘Find My iPhone’ to lockout, ransom Mac and iOS device owners in Australia, http://appleinsider.com/articles/14/05/27/hackers-break-into-lock-macs-and-ios-devices-for-ransom-in-australia (accessed 17.07.15).
-
(2014)
-
-
-
19
-
-
84986594411
-
-
(), Mobile App Reputation Report,
-
[19] Appthority (2014), Mobile App Reputation Report,
-
(2014)
-
-
-
20
-
-
84873712223
-
A survey on security for mobile devices
-
[20] La Polla, M., Martinelli, F., Sgandurra, D., A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15:1 (2013), 446–471.
-
(2013)
IEEE Commun. Surv. Tutor.
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
21
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
[21] Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V., The most dangerous code in the world: Validating SSL certificates in non-browser software. Proceedings of 2012 ACM conference on Computer and Communications Security, 2012, 38–49.
-
(2012)
Proceedings of 2012 ACM conference on Computer and Communications Security
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
23
-
-
0020720357
-
On the security of public key protocols
-
[23] Dolev, D., Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29:2 (1983), 198–208.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
25
-
-
84919570761
-
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
-
[25] Imgraben, J., Engelbrecht, A., Choo, K-K.R., Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33:12 (2014), 1347–1360.
-
(2014)
Behav. Inf. Technol.
, vol.33
, Issue.12
, pp. 1347-1360
-
-
Imgraben, J.1
Engelbrecht, A.2
Choo, K.-K.R.3
-
26
-
-
84881237506
-
iOS Hacker's Handbook
-
first ed. Wiley Publishing
-
[26] Miller, C., Blazakis, D., DaiZovi, D., Esser, S., Iozzo, V., Weinmann, R.P., iOS Hacker's Handbook. first ed., 2012, Wiley Publishing.
-
(2012)
-
-
Miller, C.1
Blazakis, D.2
DaiZovi, D.3
Esser, S.4
Iozzo, V.5
Weinmann, R.P.6
-
27
-
-
84986579876
-
-
iMAS, iOS Mobile Application Security, (accessed 17.07.15).
-
[27] iMAS, iOS Mobile Application Security, http://project-imas.github.io/ (accessed 17.07.15).
-
-
-
-
28
-
-
84986582456
-
-
(), Secure mobile application development reference, (accessed 17.07.15).
-
[28] Denim Groups (2011), Secure mobile application development reference, http://www.denimgroup.com/media/pdfs/MobileDevReference.pdf (accessed 17.07.15).
-
(2011)
-
-
-
29
-
-
84986574273
-
-
(), Best practices for secure mobile development, (accessed 17.07.15).
-
[29] viaForensics (2012), Best practices for secure mobile development, https://viaforensics.com/resources/reports/best-practices-ios-android-secure-mobile-development/ (accessed 17.07.15).
-
(2012)
-
-
-
30
-
-
84986582452
-
Smartphone secure development guidelines for app developers, (accessed 17
-
ENISA
-
[30] ENISA (2011), Smartphone secure development guidelines for app developers, http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-1/smartphone-secure-development-guidelines/at_download/fullReport (accessed 17.07.15).
-
(2011)
-
-
-
31
-
-
84964515207
-
Inside the iOS/Adthief Malware
-
accessed 17.07.15).
-
[31] A. Apvrille (2014), Inside the iOS/Adthief Malware, https://www.virusbtn.com/pdf/magazine/2014/vb201408-AdThief.pdf (accessed 17.07.15).
-
(2014)
-
-
Apvrille, A.1
-
32
-
-
84986541795
-
-
(), Anti-phishing Technology, (accessed 17.07.15).
-
[32] Kaspersky Lab (2013), Anti-phishing Technology, http://docs.apwg.org/sponsors_technical_papers/Kaspersky_Lab_Whitepaper_Anti-Phishing_eng_final.pdf (accessed 17.07.15).
-
(2013)
-
-
-
33
-
-
84922992013
-
Mobile Threats and the Underground Marketplace
-
(accessed 17.07.15).
-
[33] APWG (2013), Mobile Threats and the Underground Marketplace, http://docs.apwg.org/reports/mobile/apwg_mobile_fraud_report_april_2013.pdf (accessed 17.07.15).
-
(2013)
-
-
-
34
-
-
84875157541
-
New payment methods: A review of 2010–2012 FATF mutual evaluation reports
-
[34] Choo, K-K.R., New payment methods: A review of 2010–2012 FATF mutual evaluation reports. Comput. Secur. 36 (2013), 12–26.
-
(2013)
Comput. Secur.
, vol.36
, pp. 12-26
-
-
Choo, K.-K.R.1
-
35
-
-
84892440021
-
A standard for developing secure mobile applications
-
[35] Dye, S.M., Scarfone, K., A standard for developing secure mobile applications. Comput. Stand. Interfaces 36:3 (2014), 524–530.
-
(2014)
Comput. Stand. Interfaces
, vol.36
, Issue.3
, pp. 524-530
-
-
Dye, S.M.1
Scarfone, K.2
-
36
-
-
84880504438
-
Guidelines for Managing the Security of Mobile Devices in the Enterprise
-
(accessed 17.07.15).
-
[36] NIST (2013), Guidelines for Managing the Security of Mobile Devices in the Enterprise, http://dx.doi.org/10.6028/NIST.SP.800-124r1 (accessed 17.07.15).
-
(2013)
-
-
-
37
-
-
85046632673
-
Technical Considerations for Vetting 3rd Party Mobile (Draft)
-
(accessed 17.07.15).
-
[37] NIST (2014), Technical Considerations for Vetting 3rd Party Mobile (Draft), http://csrc.nist.gov/publications/drafts/800-163/sp800_163_draft.pdf (accessed 17.07.15).
-
(2014)
-
-
-
38
-
-
84908669768
-
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications
-
Springer-Verlag Xi'an, China 15–17 October
-
[38] Li, Y., Zhang, Y., Li, J., Gu, D., iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. Proceedings of the Eighth International Conference on Network and System Security – NSS 2014, 8792, 2014, Springer-Verlag, Xi'an, China, 349–362 15–17 October.
-
(2014)
Proceedings of the Eighth International Conference on Network and System Security – NSS 2014
, vol.8792
, pp. 349-362
-
-
Li, Y.1
Zhang, Y.2
Li, J.3
Gu, D.4
-
39
-
-
84893586289
-
Clustering iOS executable using self-organizing maps
-
[39] Yu, F., Huang, S., Chiou, L., Tsaih, R., Clustering iOS executable using self-organizing maps. Proceedings of the 2013 International Joint Conference on Neural Networks (IJCNN), 2013, 1–8.
-
(2013)
Proceedings of the 2013 International Joint Conference on Neural Networks (IJCNN)
, pp. 1-8
-
-
Yu, F.1
Huang, S.2
Chiou, L.3
Tsaih, R.4
-
40
-
-
84878003241
-
DroidAlarm: An all-sided static analysis tool for Android privilege-escalation malware
-
[40] Zhongyang, Y., Xin, Z., Mao, B., Xie, L., DroidAlarm: An all-sided static analysis tool for Android privilege-escalation malware. Proceedings of the Eighth ACM SIGSAC Symposium on Information, Computer and Communications Security, 2013, 353–358.
-
(2013)
Proceedings of the Eighth ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 353-358
-
-
Zhongyang, Y.1
Xin, Z.2
Mao, B.3
Xie, L.4
-
41
-
-
84897594353
-
Detecting mobile malware threats to homeland security through static analysis
-
[41] Seo, S., Gupta, A., Sallam, AM., Bertino, E., Yim, K., Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38 (2014), 43–53.
-
(2014)
J. Netw. Comput. Appl.
, vol.38
, pp. 43-53
-
-
Seo, S.1
Gupta, A.2
Sallam, A.M.3
Bertino, E.4
Yim, K.5
-
42
-
-
84908612027
-
CRAXDroid: Automatic android system testing by selective symbolic execution
-
[42] Yeh, C., Lu, H., Chen, C., Khor, K., Huang, S., CRAXDroid: Automatic android system testing by selective symbolic execution. Proceedings of the 2014 IEEE International Conference on Software Security and Reliability-Companion (SERE-C), 2014, 140–148.
-
(2014)
Proceedings of the 2014 IEEE International Conference on Software Security and Reliability-Companion (SERE-C)
, pp. 140-148
-
-
Yeh, C.1
Lu, H.2
Chen, C.3
Khor, K.4
Huang, S.5
-
43
-
-
84986574297
-
Personal banking apps leak info through phone
-
accessed 17.07.15).
-
[43] A. Sánchez (2014), Personal banking apps leak info through phone,(accessed 17.07.15). http://blog.ioactive.com/2014/01/personal-banking-apps-leak-info-through.html?m=1.
-
(2014)
-
-
Sánchez, A.1
-
44
-
-
84874562066
-
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices
-
[44] Spaulding, J., Krauss, A., Srinivasan, A., Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices. Proceedings of the 2012 International Conference on Malicious and Unwanted Software (MALWARE), 2012, 87–93.
-
(2012)
Proceedings of the 2012 International Conference on Malicious and Unwanted Software (MALWARE)
, pp. 87-93
-
-
Spaulding, J.1
Krauss, A.2
Srinivasan, A.3
-
45
-
-
84952351561
-
Zed Attack Proxy Project
-
(accessed 17.07.15).
-
[45] OWASP (2015), Zed Attack Proxy Project, (accessed 17.07.15). https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project.
-
(2015)
-
-
-
46
-
-
84904808792
-
Dangerous Wi-Fi access point: attacks to benign smartphone applications
-
accessed 17.07.15) doi: >
-
[46] Park, M.W., Choi, Y.H., Eom, J.H., Chung, T.M., Dangerous Wi-Fi access point: attacks to benign smartphone applications. Pers. Ubiquitous Comput. 18:6 (2014), 1373–1386 accessed 17.07.15) doi: http://dx.doi.org/10.1007/s00779-013-0739-y >.
-
(2014)
Pers. Ubiquitous Comput.
, vol.18
, Issue.6
, pp. 1373-1386
-
-
Park, M.W.1
Choi, Y.H.2
Eom, J.H.3
Chung, T.M.4
-
47
-
-
84889041424
-
AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection
-
[47] Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S., AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2013, 1043–1054.
-
(2013)
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
48
-
-
84856433075
-
Exploration of Attacks on Current Generation Smartphones
-
[48] Salerno, S., Sanzgiri, A., Upadhyaya, S., Exploration of Attacks on Current Generation Smartphones. Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT-2011)/International Conference on Mobile Web Information Systems, 5, 2011, 546–553.
-
(2011)
Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT-2011)/International Conference on Mobile Web Information Systems
, vol.5
, pp. 546-553
-
-
Salerno, S.1
Sanzgiri, A.2
Upadhyaya, S.3
-
49
-
-
84914140121
-
Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating
-
[49] Xing, L., Pan, X., Wang, R., Wang, K.X., Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating. Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014, 393–408.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy
, pp. 393-408
-
-
Xing, L.1
Pan, X.2
Wang, R.3
Wang, K.X.4
-
50
-
-
84986592423
-
Samsung ‘Find My Mobile Flaw’
-
(vulnerability ID:CVE-2014-8346), (accessed 17.07.15)
-
[50] NIST (2014), Samsung ‘Find My Mobile Flaw’ (vulnerability ID:CVE-2014-8346), (accessed 17.07.15), http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8346.
-
(2014)
-
-
-
51
-
-
84892756604
-
DroidVulMon – Android based mobile device vulnerability analysis and monitoring system
-
[51] Ham, Y.J., Lee, H.W., Lim, J.D., Kim, J.N., DroidVulMon – Android based mobile device vulnerability analysis and monitoring system. Proceedings of the 2013 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST), 2013, 26–31.
-
(2013)
Proceedings of the 2013 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST)
, pp. 26-31
-
-
Ham, Y.J.1
Lee, H.W.2
Lim, J.D.3
Kim, J.N.4
-
52
-
-
79960951090
-
Vetting mobile apps
-
accessed 17.07.15)
-
[52] Quirolgico, S., Voas, J., Kuhn, R., Vetting mobile apps. IT Prof. 13:4 (2011), 9–11 accessed 17.07.15).
-
(2011)
IT Prof.
, vol.13
, Issue.4
, pp. 9-11
-
-
Quirolgico, S.1
Voas, J.2
Kuhn, R.3
-
53
-
-
84986592438
-
Projects/OWASP Mobile Security Project – Top Ten Mobile Risks
-
(accessed 17.07.15)
-
[53] OWASP (2014), Projects/OWASP Mobile Security Project – Top Ten Mobile Risks, (accessed 17.07.15) https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks.
-
(2014)
-
-
-
54
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer–Verlag vol. 1807/2000 of LNCS
-
[54] Bellare, M., Pointcheval, D., Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proceedings of the 2000 EUROCRYPT, 2000, Springer–Verlag, 139–155 vol. 1807/2000 of LNCS.
-
(2000)
Proceedings of the 2000 EUROCRYPT
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
55
-
-
84945119254
-
Entity authentication and key distribution
-
Springer–Verlag
-
[55] Bellare, M., Rogaway, P., Entity authentication and key distribution. Proceedings of the 1993 Advances in Cryptology, 773, 1993, Springer–Verlag, 232–249.
-
(1993)
Proceedings of the 1993 Advances in Cryptology
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
56
-
-
84890026492
-
Maintaining digital certificate security
-
accessed 17.07.15)
-
[56] A. Langley (2015), Maintaining digital certificate security, (accessed 17.07.15) http://googleonlinesecurity.blogspot.com.au/2015/03/maintaining-digital-certificate-security.html.
-
(2015)
-
-
Langley, A.1
-
57
-
-
84912008171
-
Exfiltrating data from Android devices
-
[57] Do, Q., Martini, B., Choo, K-K.R., Exfiltrating data from Android devices. Comput. Secur. 48 (2015), 74–91.
-
(2015)
Comput. Secur.
, vol.48
, pp. 74-91
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
58
-
-
84949096402
-
An adversary model to evaluate DRM protection of video contents on iOS devices
-
[58] D'Orazio, C., Choo, K-K.R., An adversary model to evaluate DRM protection of video contents on iOS devices. Comput. Secur. 56 (2016), 94–110.
-
(2016)
Comput. Secur.
, vol.56
, pp. 94-110
-
-
D'Orazio, C.1
Choo, K.-K.R.2
-
59
-
-
84908256732
-
Beyond blacklisting: Cyberdefense in the era of advanced persistent threats
-
[59] Beuhring, A., Salous, K., Beyond blacklisting: Cyberdefense in the era of advanced persistent threats. IEEE Secur. Priv. 12:5 (2014), 90–93.
-
(2014)
IEEE Secur. Priv.
, vol.12
, Issue.5
, pp. 90-93
-
-
Beuhring, A.1
Salous, K.2
-
60
-
-
84985915910
-
Ransomware: A Growing Menace
-
Symantec, viewed 17th July 2015
-
[60] G. O'Gorman and G. McDonald, Symantec (2012), Ransomware: A Growing Menace, viewed 17th July 2015, http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf.
-
(2012)
-
-
O'Gorman, G.1
McDonald, G.2
-
61
-
-
84986592454
-
-
(), Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, (accessed 14.06.16).
-
[61] ZDnet (2016), Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, (accessed 14.06.16). http://www.zdnet.com/article/apple-iphone-ipad-ios-9-security-flaw-lets-malicious-apps-sneak-onto-enterprise-devices/.
-
(2016)
-
-
-
62
-
-
84986618437
-
-
(), How to Delete an App that has a Configuration Profile on your iPhone, iPad, or iPod Touch, (accessed 14.06.16).
-
[62] Apple (2015), How to Delete an App that has a Configuration Profile on your iPhone, iPad, or iPod Touch, (accessed 14.06.16). https://support.apple.com/en-au/HT205347.
-
(2015)
-
-
-
63
-
-
84954186074
-
iRiS: Vetting private API abuse in iOS applications
-
[63] Deng, Z., Saltaformaggio, B., Zhang, X., Xu, D., iRiS: Vetting private API abuse in iOS applications. Proceedings of the Twenty-second ACM SIGSAC Conference on Computer and Communications Security, 2015, 44–56.
-
(2015)
Proceedings of the Twenty-second ACM SIGSAC Conference on Computer and Communications Security
, pp. 44-56
-
-
Deng, Z.1
Saltaformaggio, B.2
Zhang, X.3
Xu, D.4
-
64
-
-
84947587045
-
A forensically sound adversary model for mobile devices
-
e0138449
-
[64] Do, Q., Martini, B., Choo, K-K.R., A forensically sound adversary model for mobile devices. PLOS ONE, 10(9), 2015, e0138449.
-
(2015)
PLOS ONE
, vol.10
, Issue.9
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
65
-
-
84979891798
-
A data exfiltration and remote exploitation attack on consumer 3D printers
-
[65] Do, Q., Martini, B., Choo, K-K.R., A data exfiltration and remote exploitation attack on consumer 3D printers. IEEE Trans. Inf. Forensics Secure. 11:10 (2016), 2174–2186 http://dx.doi.org/10.1109/TIFS.2016.2578285.
-
(2016)
IEEE Trans. Inf. Forensics Secure.
, vol.11
, Issue.10
, pp. 2174-2186
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
66
-
-
84971378672
-
“Is the data on your wearable device secure? An Android Wear smartwatch case study”
-
[66] Do, Q., Martini, B., Choo, K-K.R., “Is the data on your wearable device secure? An Android Wear smartwatch case study”. Softw. Pract. Exp., 2016 http://dx.doi.org/10.1002/spe.2414.
-
(2016)
Softw. Pract. Exp.
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
67
-
-
84975507051
-
An android social app forensics adversary model
-
[67] Azfar, A., Choo, K-K.R., Liu, L., An android social app forensics adversary model. Proceedings of Forty-ninth Annual Hawaii International Conference on System Sciences (HICSS 2016), 2016, 5597–5606.
-
(2016)
Proceedings of Forty-ninth Annual Hawaii International Conference on System Sciences (HICSS 2016)
, pp. 5597-5606
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
|