Computer security paper
Paper list
Paper list
269
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes
Android
Smartphone
Sandboxes
Malware
Sandbox-evasion techniques
285
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware
Smartphone
LTE
GSM
Cellular
Dynamic analysis
Android
Firmware
289
FedCRI: Federated Mobile Cyber-Risk Intelligence
ML
Federated learning
Android
iOS
Apps
CRI
294
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
Android
Smartphone
Java
Privacy
405
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
Android
Privilege-Escalation
Smartphones
Android app
App
Automatic
435
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model
Smartphone
Permission
Runtime Permission Model
User study
Android
iOS
585
Understanding Malicious Cross-library Data Harvesting on Android
Android
Smartphone
Apps
SDKs
594
SEApp: Bringing Mandatory Access Control to Android Apps
Android
Smartphone
Apps
Android apps
595
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android
Android
Accessibility
Smartphone
623
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned
Android