Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Marforio, Claudio"'
Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, prefer password-only authentication. One reason why two-factor authentication is so unpopular is the extra steps that the user must complete in orde
Externí odkaz:
http://arxiv.org/abs/1503.03790
Phishing in mobile applications is a relevant threat with successful attacks reported in the wild. In such attacks, malicious mobile applications masquerade as legitimate ones to steal user credentials. In this paper we categorize application phishin
Externí odkaz:
http://arxiv.org/abs/1502.06824
We address the problem of secure data deletion on log-structured file systems. We focus on the YAFFS file system, widely used on Android smartphones. We show that these systems provide no temporal guarantees on data deletion and that deleted data sti
Externí odkaz:
http://arxiv.org/abs/1106.0917
Autor:
Jayaram Masti, Ramya, Marforio, Claudio, Ranganathan, Aanjhan, Francillon, Aurélien, Capkun, Srdjan
Publikováno v:
ACSAC 2012, 28th Annual Computer Security Applications Conference, December 3-7, 2012, Orlando, Florida, USA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1093::4d698fb72920ceb9fba274d3552dd224
http://www.eurecom.fr/publication/3786
http://www.eurecom.fr/publication/3786
Publikováno v:
ACSAC 2012, 28th Annual Computer Security Applications Conference, December 3-7, 2012, Orlando, Florida, USA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1093::eee5d53973f790d107ac6b7c1866ac8d
http://www.eurecom.fr/publication/3785
http://www.eurecom.fr/publication/3785
Publikováno v:
Technical report, 724
We show that the way in which permission-based mechanisms are used on today's mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly exe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0ae805d09a0a6fb4c849a967742e685a
https://hdl.handle.net/20.500.11850/69761
https://hdl.handle.net/20.500.11850/69761
Autor:
Masti, Ramya Jayaram, Marforio, Claudio, Ranganathan, Aanjhan, Francillon, Aurélien, Capkun, Srdjan
Publikováno v:
Proceedings of the 28th Annual Computer Security Applications Conference; 12/3/2012, p61-70, 10p