


default search action
3rd SPSM@CCS 2013: Berlin, Germany
- William Enck, Adrienne Porter Felt, N. Asokan:

SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2491-5
Keynote address
- Jon A. Geater:

Security composition in the real world: squaring the circle of mobile security with contemporary device economics. 1-2
Platform hardening
- Adam Skillen, David Barrera, Paul C. van Oorschot

:
Deadbolt: locking down android disk encryption. 3-14 - Rafael Fedler, Marcel Kulicke, Julian Schütte

:
Native code execution control for attack mitigation on android. 15-20
Malware detection
- Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, Petey Aldous

, David Van Horn
:
Sound and precise malware analysis for android via pushdown reachability and entry-point saturation. 21-32 - Akshay Narayan, Prateek Saxena:

The curse of 140 characters: evaluating the efficacy of SMS spam detection on android. 33-42 - Emmanouil Vasilomanolakis

, Shankar Karuppayah
, Mathias Fischer, Max Mühlhäuser
, Mihai Plasoianu, Lars Pandikow, Wulf Pfeiffer:
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices. 43-48 - Federico Maggi

, Andrea Valdi, Stefano Zanero
:
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors. 49-54
Attacks
- James Sellwood, Jason Crampton:

Sleeping android: the danger of dormant permissions. 55-66 - Laurent Simon, Ross J. Anderson:

PIN skimmer: inferring PINs through the camera and microphone. 67-78
Privacy
- Theodore Book, Dan S. Wallach:

A case of collusion: a study of the interface between ad libraries and their apps. 79-86 - Stephen Doswell, Nauman Aslam, David Kendall, Graham Sexton:

Please slow down!: the impact on tor performance from mobility. 87-92
Authentication
- Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:

Secure enrollment and practical migration for mobile trusted execution environments. 93-98 - Shijia Pan

, An Chen, Pei Zhang:
Securitas: user identification through RGB-NIR camera pair on mobile devices. 99-104 - S. M. Taiabul Haque, Matthew K. Wright

, Shannon Scielzo
:
Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets. 105-110

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














