During my daily job I come across a lot of interesting papers and research documents. This page contains links to publicly available papers and research documents, which I believe are worth sharing. If you are aware of any papers or research documents which I should know about, please use the form at the bottom of this page to let me know!
Sign up to receive a notification when new items are added.
Papers and research
-
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
| November 7, 2019 8:42 am
Comment on “AndrODet: An adaptive Android obfuscation detector” | October 16, 2019 11:27 am
Integration of SDR and SDN for 5G | October 16, 2019 11:26 am
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE | September 29, 2019 2:43 pm
NIST SPECIAL PUBLICATION 1800-21 Mobile Device Security | September 29, 2019 8:58 am
Mitigating the Risk of Software Vulnerabilities by Adopting a SSDF | September 29, 2019 7:26 am
Detecting Android Root Exploits by Learning from Root Providers | September 13, 2019 8:11 pm
ATTACKING BYOD ENTERPRISE MOBILE SECURITY SOLUTIONS | September 13, 2019 8:10 pm
BootStomp: On the Security of Bootloaders in Mobile Devices | September 13, 2019 8:09 pm
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations | September 13, 2019 8:08 pm
AndroZoo: Collecting Millions of Android Apps for the Research Community | September 12, 2019 7:35 am
Threema – Cryptography | August 27, 2019 10:50 am
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information | August 27, 2019 8:41 am
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | August 17, 2019 8:19 pm
A Survey of the Challenges, Opportunities and Use of Multiple Antennas in Current and Future 5G Small Cell Base Stations | August 17, 2019 7:22 pm
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks oniOS and macOS Through Apple Wireless Direct Link | August 8, 2019 5:51 pm
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd | August 4, 2019 9:25 am
Tracking Anonymized Bluetooth Devices | July 17, 2019 9:53 pm
Automated Deobfuscation of Android Native Binary Code | July 17, 2019 7:20 pm
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers | July 16, 2019 8:21 am
Exploiting Sound Masking for Audio Privacy in Smartphones | July 9, 2019 8:17 pm
Uncovering Download Fraud Activities in Mobile App Markets | July 9, 2019 8:15 pm
Undermining User Privacy on Mobile Devices Using AI | July 9, 2019 7:24 pm
MagAttack: Guessing Application Launching and Operation via Smartphone | July 9, 2019 7:23 pm
Mobile Friendly or Attacker Friendly?A Large-scale Security Evaluation of Mobile-first Websites | July 9, 2019 7:11 pm
MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications | July 9, 2019 7:10 pm
Towards Understanding Android System Vulnerabilities: Techniques and Insights | July 9, 2019 7:10 pm
WEN ETA JB? A 2 million dollars problem | July 3, 2019 7:22 am
Forensic Analysis of Third Party Location Applications in Android and iOS | July 2, 2019 5:17 pm
Machine Learning for IntelligentAuthentication in 5G-and-Beyond Wireless Networks | July 2, 2019 5:13 pm
ANDRO-SIMNET: ANDROID MALWARE FAMILY CLASSIFICATION USING SOCIAL NETWORK ANALYSIS | June 27, 2019 9:52 pm
This is Your President Speaking: Spoofing Alerts in 4G LTE Networks | June 27, 2019 9:51 pm
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting | June 27, 2019 7:59 pm
Making Smartphone Application Permissions Meaningful for the Average User | June 27, 2019 7:57 pm
Evaluating the Information Security Awareness of Smartphone Users | June 26, 2019 9:28 pm
Security and Protocol Exploit Analysis of the 5G Specifications | June 21, 2019 9:29 pm
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores | June 13, 2019 4:09 pm
Hearing your touch:A new acoustic side channel on smartphones | June 10, 2019 7:10 am
We Know Where You Are! | June 9, 2019 9:34 pm
Tap ’n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens | June 9, 2019 9:00 pm
Overcoming the Compliance Challenges of Biometrics | June 8, 2019 10:31 am
Mobile A/V: Is it worth it? | June 8, 2019 9:30 am