CS 858 Reading List

Disclaimers:

Implicitly Authenticating Smartphone Users

Distributing Security Tasks among Multiple Collaborating Devices

Analyzing Network Traffic for Information Leaks

Distinguishing Between Legitimate and Illegitimate Information Leaks

Studying Users (Un)Locking Smartphones

Studying Deployed Smartphone Authentication Schemes

Improving Smartphone Authentication

Giving Up on All-or-Nothing Authentication

Attacking Geo-Social Services

Tracking People and their Devices

More Tracking and Defending Against Tracking

Inferring User Input using Side Channels

Studying and Helping App Developers

Studying Users Interacting with Permissions

Developing Better Ways to Inform Users

Introducing Android and Android Security

Developing Taint Analysis for Android

Analyzing Android Inter-Component Communication

Sandboxing Libraries and Apps

Studying Mobile, Targeted Advertising

Developing Context-Aware Privacy Mechanisms

Hacking the OS and Below


Last updated: 2016-09-23 14:20:34 -0400 [validate xhtml]