A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes
2018
Cybersecurity
Third-party IME (Input Method Editor) apps are often the preference means of interaction for Android users' input. ...
Otherwise, IM-Visor replays non-sensitive keystroke touch events for IME apps or replays non-keystroke touch events for other apps. ...
Acknowledgment We would like to thank the anonymous reviewers for their valuable comments and suggestions. ...
doi:10.1186/s42400-018-0007-6
fatcat:umjyl2knvbhjddhor3yo7y5mzi
Better Performance Through Thread-local Emulation
2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications - HotMobile '16
For example, the most recent versions of Android compile Dalvik bytecodes to native code at installtime, and apps frequently use third-party native libraries. ...
In this paper, we argue that the key to good performance is to track only when necessary, e.g., when an app handles sensitive data. ...
For example, SpanDex [8] quantifies and limits the amount of password information leaked through a malicious app's control flow. ...
doi:10.1145/2873587.2873601
dblp:conf/wmcsa/RazeenPMC16
fatcat:kxkvnpdtxfee7dlztqsmtqnk7a
ARTist: The Android Runtime Instrumentation and Security Toolkit
[article]
2016
arXiv
pre-print
We present ARTist, a compiler-based application instrumentation solution for Android. ...
ARTist is based on the new ART runtime and the on-device dex2oat compiler of Android, which replaced the interpreter-based managed runtime (DVM) from Android version 5 onwards. ...
for domain isolation, or Spandex [13] for password tracking, just to name a few. ...
arXiv:1607.06619v1
fatcat:y6pz3oyhsnfhvcrqybtfgchzh4
PmDroid: Permission Supervision for Android Advertising
2015
2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS)
It is well-known that Android mobile advertising networks may abuse their host applications' permission to collect private information. ...
We grant all permissions of Android 4.3 to these apps and record the data sent to the Internet. Then, we further analyze 430 published market apps. ...
ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers for their detailed and insightful comments. ...
doi:10.1109/srds.2015.41
dblp:conf/srds/GaoLWS15
fatcat:34t5otl63bg4ro5rjskfh5xgha
Taming the Android AppStore: Lightweight Characterization of Android Applications
[article]
2015
arXiv
pre-print
This creates challenges for users in selecting the right application. ...
We find several instances of overly aggressive communication with tracking websites, of excessive communication with ad related sites, and of communication with sites previously associated with malware ...
Different from taint analysis approaches, SpanDex [5] extends the Android Dalvik Virtual Machine to ensure that apps do not leak users' passwords. ...
arXiv:1504.06093v2
fatcat:tda3ocsa7fbxdjbb5jldyocrjm
Reducing Security Risks of Suspicious Data and Codes through a Novel Dynamic Defense Model
2019
IEEE Transactions on Information Forensics and Security
Index Terms-Dynamic defense model, dynamic taint tracking, information flow control, behavior-based malware analysis, android. ...
This paper presents a novel dynamic defense model (DDM) to reduce security risks brought by these suspicious data or codes for the open operating systems. ...
Lorenzo Cavallaro and reviewers for their valuable comments and suggestions. ...
doi:10.1109/tifs.2019.2901798
fatcat:vrsm6s7mxbh4zh5y3ovj3xeyiq
SandTrap
2018
Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '18
The most promising way to improve the performance of dynamic information-flow tracking (DIFT) for machine code is to only track instructions when they process tainted data. ...
, dynamic information-flow tracking, native code ACM Reference Format: ...
ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers and our shepherd Aruna Balasubramanian for their invaluable feedback. ...
doi:10.1145/3210240.3210321
dblp:conf/mobisys/RazeenLLMPC18
fatcat:aos4bkavc5h6tj73ygcuc4wvse
Automated Generation of Event-Oriented Exploits in Android Hybrid Apps
2018
Proceedings 2018 Network and Distributed System Security Symposium
unpublished
., Java in Android) to handle web events that occur in WebView. ...
Recently more and more Android apps integrate the embedded browser, known as "WebView", to render web pages and run JavaScript code without leaving these apps. ...
ACKNOWLEDGMENT We thank all anonymous reviewers and our shepherd, Adam Doupé, for their insightful comments and suggestions. ...
doi:10.14722/ndss.2018.23236
fatcat:n43lzon73rcc7oufvj6whi42f4
Trace: Tennessee Research and Creative Exchange Effects of Wider Step Width on Knee Biomechanics in Obese and Healthy-Weight Participants During Stair Ascent Recommended Citation "Effects of Wider Step Width on Knee Biomechanics in Obese and Healthy-Weight Participants During
2016
unpublished
You will need to wear clothing appropriate for exercise which includes spandex shorts and t-shirt. ...
Your data will be stored using password protected hard drives. Your data may be used for future research purposes after the completion of this study. ...
Is your doctor currently prescribing drugs (for example water pills) for your blood pressure of heart condition? 7. Do you know of any other reason why you should not do physical activity? ...
fatcat:abpskomjkjdephaq2rg6hbk4m4
CSITSS Proceedings 2020
2019
2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)
'; Get the products which SELECT * FROM t_prds WHERE have spandex in them. t_prds.Description = 'Warm spandex tights for winter riding; seamless chamois construction eliminates pressure points. ...
In [17] , Feature extraction is done for an app on Android platform to perform Machine Learning to identify suspicious ads. ...
in-depth analysis of these various forms of distraction can allow for intelligent alert systems. ...
doi:10.1109/csitss47250.2019.9031039
fatcat:yehi3bfgbva7xm74vp3a3i54pu
COGNITIVE 2014 Committee COGNITIVE Advisory Chairs
unpublished
We are grateful to the members of the COGNITIVE 2014 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. ...
We hope that COGNITIVE 2014 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of advanced cognitive ...
ACKNOWLEDGMENT The authors would like to thank CINVESTAV and CONA-CyT for funding this project, and to the Robotics Lab of Universidad Autónoma de Ciudad Juárez for its collaboration. ...
fatcat:ci4xdoi2snhs3gu3a3pspf7dsu
Speculating on science and ethics in Australian secondary school education: A posthumanist approach
2017
The second interview, and the six months or so time between the interviews, allowed for tracking potential changes in the participants' views, as well as the opportunity to further investigate elements ...
: 'Their bodies gleam like gold-threaded spandex; huge pink kudzu moths are fluttering around their heads in living halos' (Atwood, 2014, p. 36 ). ...
I understand I have the right to withdraw from the project for any reason without any negative consequences or disadvantages. ...
doi:10.4225/03/5a1b66a7e7d32
fatcat:gzkikemsqjclre3m3tuzvqz44m