Filters








12 Hits in 3.8 sec

Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang
2018 Cybersecurity  
Third-party IME (Input Method Editor) apps are often the preference means of interaction for Android users' input.  ...  Otherwise, IM-Visor replays non-sensitive keystroke touch events for IME apps or replays non-keystroke touch events for other apps.  ...  Acknowledgment We would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1186/s42400-018-0007-6 fatcat:umjyl2knvbhjddhor3yo7y5mzi

Better Performance Through Thread-local Emulation

Ali Razeen, Valentin Pistol, Alexander Meijer, Landon P. Cox
2016 Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications - HotMobile '16  
For example, the most recent versions of Android compile Dalvik bytecodes to native code at installtime, and apps frequently use third-party native libraries.  ...  In this paper, we argue that the key to good performance is to track only when necessary, e.g., when an app handles sensitive data.  ...  For example, SpanDex [8] quantifies and limits the amount of password information leaked through a malicious app's control flow.  ... 
doi:10.1145/2873587.2873601 dblp:conf/wmcsa/RazeenPMC16 fatcat:kxkvnpdtxfee7dlztqsmtqnk7a

ARTist: The Android Runtime Instrumentation and Security Toolkit [article]

Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber
2016 arXiv   pre-print
We present ARTist, a compiler-based application instrumentation solution for Android.  ...  ARTist is based on the new ART runtime and the on-device dex2oat compiler of Android, which replaced the interpreter-based managed runtime (DVM) from Android version 5 onwards.  ...  for domain isolation, or Spandex [13] for password tracking, just to name a few.  ... 
arXiv:1607.06619v1 fatcat:y6pz3oyhsnfhvcrqybtfgchzh4

PmDroid: Permission Supervision for Android Advertising

Xing Gao, Dachuan Liu, Haining Wang, Kun Sun
2015 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS)  
It is well-known that Android mobile advertising networks may abuse their host applications' permission to collect private information.  ...  We grant all permissions of Android 4.3 to these apps and record the data sent to the Internet. Then, we further analyze 430 published market apps.  ...  ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers for their detailed and insightful comments.  ... 
doi:10.1109/srds.2015.41 dblp:conf/srds/GaoLWS15 fatcat:34t5otl63bg4ro5rjskfh5xgha

Taming the Android AppStore: Lightweight Characterization of Android Applications [article]

Luigi Vigneri, Jaideep Chandrashekar, Ioannis Pefkianakis, Olivier Heen
2015 arXiv   pre-print
This creates challenges for users in selecting the right application.  ...  We find several instances of overly aggressive communication with tracking websites, of excessive communication with ad related sites, and of communication with sites previously associated with malware  ...  Different from taint analysis approaches, SpanDex [5] extends the Android Dalvik Virtual Machine to ensure that apps do not leak users' passwords.  ... 
arXiv:1504.06093v2 fatcat:tda3ocsa7fbxdjbb5jldyocrjm

Reducing Security Risks of Suspicious Data and Codes through a Novel Dynamic Defense Model

Zezhi Wu, Xingyuan Chen, Zhi Yang, Xuehui Du
2019 IEEE Transactions on Information Forensics and Security  
Index Terms-Dynamic defense model, dynamic taint tracking, information flow control, behavior-based malware analysis, android.  ...  This paper presents a novel dynamic defense model (DDM) to reduce security risks brought by these suspicious data or codes for the open operating systems.  ...  Lorenzo Cavallaro and reviewers for their valuable comments and suggestions.  ... 
doi:10.1109/tifs.2019.2901798 fatcat:vrsm6s7mxbh4zh5y3ovj3xeyiq

SandTrap

Ali Razeen, Alvin R. Lebeck, David H. Liu, Alexander Meijer, Valentin Pistol, Landon P. Cox
2018 Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '18  
The most promising way to improve the performance of dynamic information-flow tracking (DIFT) for machine code is to only track instructions when they process tainted data.  ...  , dynamic information-flow tracking, native code ACM Reference Format:  ...  ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers and our shepherd Aruna Balasubramanian for their invaluable feedback.  ... 
doi:10.1145/3210240.3210321 dblp:conf/mobisys/RazeenLLMPC18 fatcat:aos4bkavc5h6tj73ygcuc4wvse

Automated Generation of Event-Oriented Exploits in Android Hybrid Apps

Guangliang Yang, Jeff Huang, Guofei Gu
2018 Proceedings 2018 Network and Distributed System Security Symposium   unpublished
., Java in Android) to handle web events that occur in WebView.  ...  Recently more and more Android apps integrate the embedded browser, known as "WebView", to render web pages and run JavaScript code without leaving these apps.  ...  ACKNOWLEDGMENT We thank all anonymous reviewers and our shepherd, Adam Doupé, for their insightful comments and suggestions.  ... 
doi:10.14722/ndss.2018.23236 fatcat:n43lzon73rcc7oufvj6whi42f4

Trace: Tennessee Research and Creative Exchange Effects of Wider Step Width on Knee Biomechanics in Obese and Healthy-Weight Participants During Stair Ascent Recommended Citation "Effects of Wider Step Width on Knee Biomechanics in Obese and Healthy-Weight Participants During

Masters Theses, Derek Yocum, Derek Yocum, Scott
2016 unpublished
You will need to wear clothing appropriate for exercise which includes spandex shorts and t-shirt.  ...  Your data will be stored using password protected hard drives. Your data may be used for future research purposes after the completion of this study.  ...  Is your doctor currently prescribing drugs (for example water pills) for your blood pressure of heart condition? 7. Do you know of any other reason why you should not do physical activity?  ... 
fatcat:abpskomjkjdephaq2rg6hbk4m4

CSITSS Proceedings 2020

2019 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)  
'; Get the products which SELECT * FROM t_prds WHERE have spandex in them. t_prds.Description = 'Warm spandex tights for winter riding; seamless chamois construction eliminates pressure points.  ...  In [17] , Feature extraction is done for an app on Android platform to perform Machine Learning to identify suspicious ads.  ...  in-depth analysis of these various forms of distraction can allow for intelligent alert systems.  ... 
doi:10.1109/csitss47250.2019.9031039 fatcat:yehi3bfgbva7xm74vp3a3i54pu

COGNITIVE 2014 Committee COGNITIVE Advisory Chairs

Hakim Lounis, Canada, Hermann Kaindl, Narayanan Kulathuramaiyer, Malaysia, Jose Alfredo, F Costa, Hakim Lounis, Canada, Om Rishi, Hermann Kaindl, Narayanan Kulathuramaiyer (+78 others)
unpublished
We are grateful to the members of the COGNITIVE 2014 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  We hope that COGNITIVE 2014 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of advanced cognitive  ...  ACKNOWLEDGMENT The authors would like to thank CINVESTAV and CONA-CyT for funding this project, and to the Robotics Lab of Universidad Autónoma de Ciudad Juárez for its collaboration.  ... 
fatcat:ci4xdoi2snhs3gu3a3pspf7dsu

Speculating on science and ethics in Australian secondary school education: A posthumanist approach

BLUE JARYN MAHY
2017
The second interview, and the six months or so time between the interviews, allowed for tracking potential changes in the participants' views, as well as the opportunity to further investigate elements  ...  : 'Their bodies gleam like gold-threaded spandex; huge pink kudzu moths are fluttering around their heads in living halos' (Atwood, 2014, p. 36 ).  ...  I understand I have the right to withdraw from the project for any reason without any negative consequences or disadvantages.  ... 
doi:10.4225/03/5a1b66a7e7d32 fatcat:gzkikemsqjclre3m3tuzvqz44m