Smashed: Sniffing and manipulating android sensor data for offensive purposes

M Mohamed, B Shrestha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

Smashed: Sniffing and manipulating android sensor data

M Mohamed, B Shrestha, N Saxena - … of the Sixth ACM Conference on …, 2016 - dl.acm.org
The current Android sensor security model either allows only restrictive read access to
sensitive sensors (eg, an app can only read its own touch data) or requires special install …

Semadroid: A privacy-aware sensor management framework for smartphones

Z Xu, S Zhu - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
While mobile sensing applications are booming, the sensor management mechanisms in
current smartphone operating systems are left behind--they are incomprehensive and …

[HTML][HTML] Sensor Guardian: prevent privacy inference on Android sensors

X Bai, J Yin, YP Wang - EURASIP Journal on Information Security, 2017 - Springer
Privacy inference attacks based on sensor data is an emerging and severe threat on smart
devices, in which malicious applications leverage data from innocuous sensors to infer …

sendroid: Auditing sensor access in android system-wide

W Han, C Cao, H Chen, D Li, Z Fang… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Sensors are widely used in modern mobile devices (eg, smartphones, watches) and may
gather abundant information from environments as well as about users, eg, photos, sounds …

{ASM}: a programmable interface for extending android security

S Heuser, A Nadkarni, W Enck… - 23rd USENIX Security …, 2014 - usenix.org
Android, iOS, and Windows 8 are changing the application architecture of consumer
operating systems. These new architectures required OS designers to rethink security and …

{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings

G Petracca, AA Reineh, Y Sun, J Grossklags… - 26th USENIX security …, 2017 - usenix.org
System designers have long struggled with the challenge of determining how to control
when untrusted applications may perform operations using privacy-sensitive sensors …

This sneaky piggy went to the android ad market: Misusing mobile sensors for stealthy data exfiltration

M Diamantaris, S Moustakas, L Sun… - Proceedings of the …, 2021 - dl.acm.org
Mobile sensors have transformed how users interact with modern smartphones and
enhance their overall experience. However, the absence of sufficient access control for …

{HideMyApp}: Hiding the Presence of Sensitive Apps on Android

A Pham, I Dacosta, E Losiouk, J Stephan… - 28th USENIX Security …, 2019 - usenix.org
Millions of users rely on mobile health (mHealth) apps to manage their wellness and
medical conditions. Although the popularity of such apps continues to grow, several privacy …

Sensing-enabled channels for hard-to-detect command and control of mobile devices

R Hasan, N Saxena, T Haleviz, S Zawoad… - Proceedings of the 8th …, 2013 - dl.acm.org
The proliferation of mobile computing devices has enabled immense opportunities for
everyday users. At the same time, however, this has opened up new, and perhaps more …