Pull requests are gladly accepted!๐
The summary includes - Abstract, contribution, strengths, weaknesses and future work.
- Understanding Android Security Paper link
- Android Permissions Demystified Paper link
- Android Permissions User Attention Comprehension and Behavior Paper link
- Permission Re-Delegation: Attacks and Defenses Paper link
- FLEXDROID: Enforcing In-App Privilege Separation in Android Paper link
- Aurasium: Practical Policy Enforcement for Android Applications Paper link
- Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks Paper link
- CryptoLock (and Drop It) Stopping Ransomware Attacks on User Data Paper link
- Securing Embedded User Interfaces Android and Beyond Paper link
- Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Paper link
- Adnostic: Privacy Preserving Targeted Advertising Paper link
- Controlling UAVs with Sensor Input Spoofing Attacks Paper Link
- Remote Attacks on Automated Vehicles Sensors Experiments on Camera and LiDAR Paper Link
- How Unique Is Your Web Browser? Paper Link
- Using Program Analysis to Synthesize Sensor Spoofing Attacks Papar link
- Deep Fingerprinting Undermining Website Fingerprinting Defenses with Deep Learning Papar link
- The Pythia PRF Service Paper link
- PatternListener: Cracking Android Pattern Lock Using Acoustic Signals Paper link