Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of the device from the network side (e.g., controlling a Wi-Fi access point). The fact that the network traffic is often encrypted makes the attack even more challenging. In this paper, we investigate to what extent such an external attacker can identify the specific actions that a user is performing on ...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
In today’s world mobile applications have been widely used, which bring great convenience to people’...
The openness of Android application development mech-anism poses security challenges to smartphone u...
While smartphone usage become more and more pervasive, people start also asking to which extent such...
Abstract: The apps installed on a smartphone can reveal much information about a user, such as their...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Mobile users install different types of applications on their mobile devices based on their interest...
As Android OS establishes itself as the primary platform on smartphones, a substantial increase in m...
Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of co...
Android devices have become the most popular of mobile devices; omnipresent in both business and pri...
Smartphones have become the central communication and computing devices in our daily life because of...
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
With the emerging trend of smart IoT devices, providing and ensuring the privacy of the users'-devic...
The advancements in the Internet technology and computer networks have led to an increased importanc...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
In today’s world mobile applications have been widely used, which bring great convenience to people’...
The openness of Android application development mech-anism poses security challenges to smartphone u...
While smartphone usage become more and more pervasive, people start also asking to which extent such...
Abstract: The apps installed on a smartphone can reveal much information about a user, such as their...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
In order to make apps functional, mobile operating systems, such as Android, allow applications to a...
Mobile users install different types of applications on their mobile devices based on their interest...
As Android OS establishes itself as the primary platform on smartphones, a substantial increase in m...
Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of co...
Android devices have become the most popular of mobile devices; omnipresent in both business and pri...
Smartphones have become the central communication and computing devices in our daily life because of...
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
With the emerging trend of smart IoT devices, providing and ensuring the privacy of the users'-devic...
The advancements in the Internet technology and computer networks have led to an increased importanc...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
In today’s world mobile applications have been widely used, which bring great convenience to people’...
The openness of Android application development mech-anism poses security challenges to smartphone u...