Mobile phones have almost replaced the work of traditional computers and people nowadays use them for both business and personal purposes, in a much more complex way than some years ago. However, the notion of “mobile phone” has not changed accordingly: the majority of the people consider this device as a phone without thinking the implications of their digital life when using it. In this paper we demonstrate how to steal user’s credentials and sensitive information in general from the memory of an Android device. We do so by using the findings of our previous work, named MobiLeak Project, and by exploiting vulnerabilities due to both the user behavior and the poor practices when developing mobile applications. Finally, and most importantly...
To log in to a mobile social network service (SNS) server, users must enter their ID and password to...
We study the “anti-theft ” mechanisms available to con-sumers to thwart unauthorised access to perso...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...
In this paper, we investigate and evaluate through experimental analysis the possibility of recoveri...
Due to their increasing pervasiveness, smartphones and more in general mobile devices are becoming t...
Part 5: Adoption Issues in e/m-ServicesInternational audienceThis paper investigates whether authent...
Abstract. This paper investigates whether authentication credentials in the vol-atile memory of Andr...
Mobile devices are widely spread all over the world, and Android is the most popular operative syste...
Android applications store large amounts of sensitive information that may be exposed and exploited....
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inj...
Abstract: As people are using their smartphones more frequently, cyber criminals are focusing their ...
The flexibility of Android is mainly based on the cross application (app for short) access mechanism...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Android is the most used operating system in the world, because of this the probability of an androi...
To log in to a mobile social network service (SNS) server, users must enter their ID and password to...
We study the “anti-theft ” mechanisms available to con-sumers to thwart unauthorised access to perso...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...
In this paper, we investigate and evaluate through experimental analysis the possibility of recoveri...
Due to their increasing pervasiveness, smartphones and more in general mobile devices are becoming t...
Part 5: Adoption Issues in e/m-ServicesInternational audienceThis paper investigates whether authent...
Abstract. This paper investigates whether authentication credentials in the vol-atile memory of Andr...
Mobile devices are widely spread all over the world, and Android is the most popular operative syste...
Android applications store large amounts of sensitive information that may be exposed and exploited....
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inj...
Abstract: As people are using their smartphones more frequently, cyber criminals are focusing their ...
The flexibility of Android is mainly based on the cross application (app for short) access mechanism...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Android is the most used operating system in the world, because of this the probability of an androi...
To log in to a mobile social network service (SNS) server, users must enter their ID and password to...
We study the “anti-theft ” mechanisms available to con-sumers to thwart unauthorised access to perso...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...