


default search action
6th SPSM@CCS 2016: Vienna, Austria
- Long Lu, Mohammad Mannan:

Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016. ACM 2016, ISBN 978-1-4503-4564-4
Keynote Address
- Jan-Erik Ekberg:

Hardware Isolation for Trusted Execution. 1
Studies and Analyses
- Uri Kanonov, Avishai Wool:

Secure Containers in Android: The Samsung KNOX Case Study. 3-12 - Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:

White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones. 13-21 - Wei Liu, Yueqian Zhang, Zhou Li

, Hai-Xin Duan:
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps. 23-32 - Damilola Orikogbo, Matthias Büchler, Manuel Egele:

CRiOS: Toward Large-Scale iOS Application Analysis. 33-42
Privacy
- Vincent F. Taylor, Ivan Martinovic:

SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis. 43-52 - Christopher Thompson, David A. Wagner:

Securing Recognizers for Rich Video Applications. 53-62 - Hannah Quay-de la Vallee, Paige Selby, Shriram Krishnamurthi:

On a (Per)Mission: Building Privacy Into the App Marketplace. 63-72 - Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru:

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks. 73-82
Attacks and Defenses
- Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking. 83-92 - Elie Bursztein, Artem Malyshev, Tadek Pietraszek, Kurt Thomas:

Picasso: Lightweight Device Class Fingerprinting for Web Clients. 93-102 - Mansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto:

Detecting Misuse of Google Cloud Messaging in Android Badware. 103-112 - Jakob Jakobsen, Claudio Orlandi:

On the CCA (in)Security of MTProto. 113-116 - Martin Pfeiffer, Jan-Pascal Kwiotek, Jiska Classen, Robin Klose, Matthias Hollick:

Analyzing TETRA Location Privacy and Network Availability. 117-122

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














