default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/spsm2014.bht:"
@inproceedings{DBLP:conf/ccs/ArztHRB14, author = {Steven Arzt and Stephan Huber and Siegfried Rasthofer and Eric Bodden}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {21--26}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666621}, doi = {10.1145/2666620.2666621}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArztHRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ContiFPPS14, author = {Mauro Conti and Earlence Fernandes and Justin Paupore and Atul Prakash and Daniel Simionato}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {{OASIS:} Operational Access Sandboxes for Information Security}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {105--110}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666629}, doi = {10.1145/2666620.2666629}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ContiFPPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CooijmansRP14, author = {Tim Cooijmans and Joeri de Ruiter and Erik Poll}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Analysis of Secure Key Storage Solutions on Android}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {11--20}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666627}, doi = {10.1145/2666620.2666627}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CooijmansRP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DabrowskiKUW14, author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {{QR} Inception: Barcode-in-Barcode Attacks}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {3--10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666624}, doi = {10.1145/2666620.2666624}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DabrowskiKUW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DiaoLZZ14, author = {Wenrui Diao and Xiangyu Liu and Zhe Zhou and Kehuan Zhang}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {63--74}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666623}, doi = {10.1145/2666620.2666623}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DiaoLZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DingPR14, author = {Yuan Ding and Sai Teja Peddinti and Keith W. Ross}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Stalking Beijing from Timbuktu: {A} Generic Measurement Approach for Exploiting Location-Based Social Discovery}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {75--80}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666625}, doi = {10.1145/2666620.2666625}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DingPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LortzMSBSW14, author = {Steffen Lortz and Heiko Mantel and Artem Starostin and Timo B{\"{a}}hr and David Schneider and Alexandra Weber}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Cassandra: Towards a Certifying App Store for Android}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {93--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666631}, doi = {10.1145/2666620.2666631}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LortzMSBSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ning14, author = {Peng Ning}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Samsung {KNOX} and Enterprise Mobile Security}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666632}, doi = {10.1145/2666620.2666632}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ning14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Spreitzer14, author = {Raphael Spreitzer}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {{PIN} Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666622}, doi = {10.1145/2666620.2666622}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Spreitzer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VarmaWLL14, author = {Saksham Varma and Robert J. Walls and Brian Lynn and Brian Neil Levine}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Efficient Smart Phone Forensics Based on Relevance Feedback}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {81--91}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666628}, doi = {10.1145/2666620.2666628}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VarmaWLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VidasTNTCT14, author = {Timothy Vidas and Jiaqi Tan and Jay Nahata and Chaur Lih Tan and Nicolas Christin and Patrick Tague}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {{A5:} Automated Analysis of Adversarial Android Applications}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {39--50}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666630}, doi = {10.1145/2666620.2666630}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VidasTNTCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeiL14, author = {Zheng Wei and David Lie}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {27--38}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666626}, doi = {10.1145/2666620.2666626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeiL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014spsm, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2666620}, isbn = {978-1-4503-3155-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014spsm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.