During my daily job I come across a lot of interesting papers and research documents. This page contains links to publicly available papers and research documents, which I believe are worth sharing. If you are aware of any papers or research documents which I should know about, please use the form at the bottom of this page to let me know!
Sign up to receive a notification when new items are added.
Papers and research
-
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
| November 7, 2019 9:44 am
Comment on “AndrODet: An adaptive Android obfuscation detector” | October 16, 2019 12:28 pm
Integration of SDR and SDN for 5G | October 16, 2019 12:28 pm
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE | October 16, 2019 12:28 pm
NIST SPECIAL PUBLICATION 1800-21 Mobile Device Security | October 16, 2019 12:28 pm
Mitigating the Risk of Software Vulnerabilities by Adopting a SSDF | October 16, 2019 12:28 pm
Detecting Android Root Exploits by Learning from Root Providers | September 18, 2019 10:54 am
ATTACKING BYOD ENTERPRISE MOBILE SECURITY SOLUTIONS | September 18, 2019 10:54 am
BootStomp: On the Security of Bootloaders in Mobile Devices | September 18, 2019 10:54 am
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations | September 18, 2019 10:54 am
AndroZoo: Collecting Millions of Android Apps for the Research Community | September 18, 2019 10:54 am
Threema – Cryptography | August 30, 2019 4:43 pm
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information | August 30, 2019 4:43 pm
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | August 17, 2019 9:20 pm
A Survey of the Challenges, Opportunities and Use of Multiple Antennas in Current and Future 5G Small Cell Base Stations | August 17, 2019 8:22 pm
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks oniOS and macOS Through Apple Wireless Direct Link | August 8, 2019 6:51 pm
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd | August 4, 2019 10:30 am
Tracking Anonymized Bluetooth Devices | July 17, 2019 10:53 pm
Automated Deobfuscation of Android Native Binary Code | July 17, 2019 8:21 pm
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers | July 16, 2019 9:21 am
Exploiting Sound Masking for Audio Privacy in Smartphones | July 9, 2019 9:17 pm
Uncovering Download Fraud Activities in Mobile App Markets | July 9, 2019 9:15 pm
Undermining User Privacy on Mobile Devices Using AI | July 9, 2019 8:24 pm
MagAttack: Guessing Application Launching and Operation via Smartphone | July 9, 2019 8:23 pm
Mobile Friendly or Attacker Friendly?A Large-scale Security Evaluation of Mobile-first Websites | July 9, 2019 8:11 pm
MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications | July 9, 2019 8:10 pm
Towards Understanding Android System Vulnerabilities: Techniques and Insights | July 9, 2019 8:10 pm
WEN ETA JB? A 2 million dollars problem | July 3, 2019 8:22 am
Forensic Analysis of Third Party Location Applications in Android and iOS | July 2, 2019 6:17 pm
Machine Learning for IntelligentAuthentication in 5G-and-Beyond Wireless Networks | July 2, 2019 6:13 pm
ANDRO-SIMNET: ANDROID MALWARE FAMILY CLASSIFICATION USING SOCIAL NETWORK ANALYSIS | June 27, 2019 10:52 pm
This is Your President Speaking: Spoofing Alerts in 4G LTE Networks | June 27, 2019 10:51 pm
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting | June 27, 2019 8:59 pm
Making Smartphone Application Permissions Meaningful for the Average User | June 27, 2019 8:57 pm
Evaluating the Information Security Awareness of Smartphone Users | June 26, 2019 10:28 pm
Security and Protocol Exploit Analysis of the 5G Specifications | June 21, 2019 10:29 pm
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores | June 13, 2019 5:09 pm
Hearing your touch:A new acoustic side channel on smartphones | June 10, 2019 8:10 am
We Know Where You Are! | June 9, 2019 10:34 pm
Tap ’n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens | June 9, 2019 10:00 pm
Overcoming the Compliance Challenges of Biometrics | June 8, 2019 10:30 am
Mobile A/V: Is it worth it? | June 8, 2019 9:30 am