© 2018 IEEE. Private breach has always been an important threat to mobile security. Recent studies show that an attacker can infer user private information through side channels, such as the use of runtime memory and network usage. For side-channel attacks, malicious applications generally run parallel in the background with a foreground application and stealthily collect side-channel information. In this paper, we analyze the relationship between memory changes and activity transition, then use side-channel information to label an Activity and build an Activity signature database. We show how to use the runtime memory exposure to infer the Activity transition of the current application and use other side channels to infer its Activity inte...
International audienceModern malware threats utilize many advanced techniques to increase their stea...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
Smart mobile devices process and store a vast amount of security- and privacy sensitive data. To pr...
© 2018 Private breach has always been an important threat to mobile security. Recent studies show th...
Abstract—We describe a new side-channel attack. By track-ing changes in the application’s memory foo...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenari...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
The openness of Android application development mech-anism poses security challenges to smartphone u...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
In few years Android has become the most widespread operating system among mobile devices. Its extre...
Abstract: The apps installed on a smartphone can reveal much information about a user, such as their...
International audienceModern malware threats utilize many advanced techniques to increase their stea...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
Smart mobile devices process and store a vast amount of security- and privacy sensitive data. To pr...
© 2018 Private breach has always been an important threat to mobile security. Recent studies show th...
Abstract—We describe a new side-channel attack. By track-ing changes in the application’s memory foo...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenari...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
The openness of Android application development mech-anism poses security challenges to smartphone u...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
In few years Android has become the most widespread operating system among mobile devices. Its extre...
Abstract: The apps installed on a smartphone can reveal much information about a user, such as their...
International audienceModern malware threats utilize many advanced techniques to increase their stea...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
Smart mobile devices process and store a vast amount of security- and privacy sensitive data. To pr...