CS 858 Reading List
Disclaimers:
- This reading list contains more papers than what we will be able to read and discuss in class. The actual list of presented papers will be chosen based on people's interests. Feel free to read the remaining papers on your own, like to choose a course project.
- The order in which we will discuss the papers in class will likely not correspond to the order below.
- The PDFs and their abstracts are also available in the bidding system.
- If you try to download a local copy below from a non-uWaterloo host, you will have to authenticate using your WatIAM credentials. You can also download a file with all the papers.
Implicitly Authenticating Smartphone Users
Distributing Security Tasks among Multiple Collaborating Devices
Analyzing Network Traffic for Information Leaks
Distinguishing Between Legitimate and Illegitimate Information Leaks
Studying Users (Un)Locking Smartphones
Studying Deployed Smartphone Authentication Schemes
- Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption. C. Bhagavatula, B. Ur, K. Iacovino, S.M. Kywey, L.F. Cranor, and M. Savvides, USEC 2015. [abstract] [local]
- Usability and Security of Text Passwords on Mobile Devices. W. Melicher, D. Kurilova, S.M. Segreti, P. Kalvani, R. Shay, B. Ur, L. Bauer, N. Christin, L. F. Cranor, and M.L. Mazurek, CHI 2016. [abstract] [local]
Improving Smartphone Authentication
Giving Up on All-or-Nothing Authentication
Attacking Geo-Social Services
- Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. I. Polakis, G. Argyros, T. Petsios, S. Sivakom, and A.D. Keromytis, CCS 2015. [abstract] [local]
- Defending against Sybil Devices in Crowdsourced Mapping Services. G. Wang, B. Wang, T. Wang, A. Nika, H. Zheng, and B.Y. Zhao, MobiSys 2016. [abstract] [local]
Tracking People and their Devices
More Tracking and Defending Against Tracking
Inferring User Input using Side Channels
Studying and Helping App Developers
- Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. B. Reaves, N. Scaife, A. Bates, P. Traynor, and K.R.B. Butler, USENIX Security 2015. [abstract] [local]
- Rethinking SSL development in an appified world. S. Fahl, M. Harbach, H. Perl, M. Koetter, and M. Smith, CCS 2013. [abstract] [local]
Studying Users Interacting with Permissions
- Android permissions: user attention, comprehension, and behavior. A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, SOUPS 2012. [abstract] [local]
- Android Permissions Remystified: A Field Study on Contextual Integrity. P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov, USENIX Security 2015. [abstract] [local]
Developing Better Ways to Inform Users
- Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. B. Liu, M. Schaarup Andersen, F. Schaub, H. Almuhimedi, S. Zhang, N. Sadeh, A. Acquisti, and Y. Agarwal, SOUPS 2016. [abstract] [local]
- The Impact of Timing on the Salience of Smartphone App Privacy Notices. R. Balebako, F. Schaub, I. Adjerid, A. Acquisti, and L. Cranor, SPSM 2015. [abstract] [local]
Introducing Android and Android Security
Developing Taint Analysis for Android
- TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N. Sheth, OSDI 2010. [abstract] [local]
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel, PLDI 2014. [abstract] [local]
Analyzing Android Inter-Component Communication
- Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon, USENIX Security 2013. [abstract] [local]
- Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. D. Octeau, S. Jha, M. Dering, P. McDaniel, A. Bartel, L. Li, J. Klein, and Y. Le Traon, POPL 2016. [abstract] [local]
Sandboxing Libraries and Apps
- Boxify: Full-fledged App Sandboxing for Stock Android. M. Backes, S. Bugiel, C. Hammer, O. Schranz, and P. von Styp-Rekowsky, USENIX Security 2015. [abstract] [local]
- FLEXDROID: Enforcing In-App Privilege Separation in Android. J. Seo, D. Kim, D. Cho, I. Shin, and T. Kim, NDSS 2016. [abstract] [local]
Studying Mobile, Targeted Advertising
Developing Context-Aware Privacy Mechanisms
- I-Pic: A Platform for Privacy-Compliant Image Capture. P. Aditya, R. Sen, P. Druschel, S.J. Oh, R. Benenson, M. Fritz, B. Schiele, B. Bhattacharjee, and T.T. Wu, MobiSys 2016. [abstract] [local]
- ipShield: A Framework For Enforcing Context-Aware Privacy. S. Chakraborty, C. Shen, K.R. Raghavan, Y. Shoukry, M. Millar, and M. Srivastava, NSDI 2014. [abstract] [local]
Hacking the OS and Below
Last updated: 2016-09-23 14:20:34 -0400
[validate xhtml]