Computer security paper
Paper list
Paper list
269
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes
Android
Smartphone
Sandboxes
Malware
Sandbox-evasion techniques
285
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware
Smartphone
LTE
GSM
Cellular
Dynamic analysis
Android
Firmware
294
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
Android
Smartphone
Java
Privacy
405
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
Android
Privilege-Escalation
Smartphones
Android app
App
Automatic
435
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model
Smartphone
Permission
Runtime Permission Model
User study
Android
iOS
458
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage
Smartphone
Side-Channel
570
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Apple
AirDrop
Privacy
Authentication
Smartphone
iOS
Bluetooth
BLE
585
Understanding Malicious Cross-library Data Harvesting on Android
Android
Smartphone
Apps
SDKs
594
SEApp: Bringing Mandatory Access Control to Android Apps
Android
Smartphone
Apps
Android apps
595
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android
Android
Accessibility
Smartphone
1580
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya
Smartphone
Mobile Apps