Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Ruturaj4/Mobile-Security-Paper_summaries
Papers summaries of some of the most important Mobile Security Papers 📃
https://github.com/Ruturaj4/Mobile-Security-Paper_summaries
adsdk android android-permissions android-sdk ios malware mobile-app mobile-security ransomware research-paper-explanation research-paper-summaries
Last synced: 22 days ago
JSON representation
Papers summaries of some of the most important Mobile Security Papers 📃
- Host: GitHub
- URL: https://github.com/Ruturaj4/Mobile-Security-Paper_summaries
- Owner: Ruturaj4
- Created: 2018-09-11T04:49:13.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2019-01-09T05:59:48.000Z (almost 6 years ago)
- Last Synced: 2024-11-13T14:52:40.463Z (30 days ago)
- Topics: adsdk, android, android-permissions, android-sdk, ios, malware, mobile-app, mobile-security, ransomware, research-paper-explanation, research-paper-summaries
- Homepage:
- Size: 1.47 MB
- Stars: 6
- Watchers: 4
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Ruturaj4/Mobile-Security-Paper_summaries - Papers summaries of some of the most important Mobile Security Papers 📃 (Others)
README
Mobile Security Paper summaries 📃
Paper summaries of the most important papers related to the mobile security
Pull requests are gladly accepted!🍄
The summary includes - Abstract, contribution, strengths, weaknesses and future work.
- Understanding Android Security
Paper link
- Android Permissions Demystified
Paper link
- Android Permissions User Attention Comprehension and Behavior
Paper link
- Permission Re-Delegation: Attacks and Defenses
Paper link
- FLEXDROID: Enforcing In-App Privilege Separation in Android
Paper link
- Aurasium: Practical Policy Enforcement for Android Applications
Paper link
- Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
Paper link
- CryptoLock (and Drop It) Stopping Ransomware Attacks on User Data
Paper link
- Securing Embedded User Interfaces Android and Beyond
Paper link
- Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
Paper link
- Adnostic: Privacy Preserving Targeted Advertising
Paper link
- Controlling UAVs with Sensor Input Spoofing Attacks
Paper Link
- Remote Attacks on Automated Vehicles Sensors Experiments on Camera and LiDAR
Paper Link
- How Unique Is Your Web Browser?
Paper Link
- Using Program Analysis to Synthesize Sensor Spoofing Attacks
Papar link
- Deep Fingerprinting Undermining Website Fingerprinting Defenses with Deep Learning
Papar link
- The Pythia PRF Service
Paper link
- PatternListener: Cracking Android Pattern Lock Using Acoustic Signals
Paper link