Adaptive encrypted traffic fingerprinting with bi-directional dependence

K Al-Naami, S Chandra, A Mustafa, L Khan… - Proceedings of the …, 2016 - dl.acm.org
Recently, network traffic analysis has been increasingly used in various applications
including security, targeted advertisements, and network management. However, data …

[PDF][PDF] Automated generation of event-oriented exploits in android hybrid apps

G Yang, J Huang - Proc. of the Network and Distributed System Security …, 2018 - par.nsf.gov
Recently more and more Android apps integrate the embedded browser, known as
“WebView”, to render web pages and run JavaScript code without leaving these apps …

Up-to-crash: Evaluating third-party library updatability on android

J Huang, N Borges, S Bugiel… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Buggy and flawed third-party libraries increase their host app's attack surface and put the
users' privacy at risk. To avert this risk, libraries have to be kept updated to their newest …

{Iframes/Popups} Are Dangerous in Mobile {WebView}: Studying and Mitigating Differential Context Vulnerabilities

G Yang, J Huang, G Gu - 28th USENIX Security Symposium (USENIX …, 2019 - usenix.org
In this paper, we present a novel class of Android WebView vulnerabilities (called
Differential Context Vulnerabilities or DCVs) associated with web iframe/popup behaviors …

Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls

D Wu, D Gao, D Lo - Empirical Software Engineering, 2021 - Springer
Android has been the most popular smartphone system with multiple platform versions
active in the market. To manage the application's compatibility with one or more platform …

SafeCandy: System for security, analysis and validation in Android

S Londoño, C Urcuqui, MF Amaya… - Sistemas y …, 2015 - elearning.icesi.edu.co
Android is an operating system which currently has over one billion active users for all their
mobile devices, a market impact that is influencing an increase in the amount of information …

Third-party library security management for mobile applications

W Hu - 2016 - etda.libraries.psu.edu
In recent years, the Android operating system has had an explosive growth in the number of
applications containing third-party libraries for different purposes. In this thesis, we identify …

Security Weaknesses of the Android Advertising Ecosystem

J Tate - 2015 - vtechworks.lib.vt.edu
Mobile device security is becoming increasingly important as the number of devices that are
used continues to grow and has surpassed one billion active devices globally. In this thesis …

When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps

G Yang - 2019 - search.proquest.com
Nowadays, mobile app developers are enjoying the benefits of the amalgamation of web
and mobile platforms. Developers can easily and smoothly integrate all sorts of web services …

[PDF][PDF] Enhancing Cybersecurity with Encrypted Traffic Fingerprinting

KM Al Naami - 2017 - utd-ir.tdl.org
All Praise is due to Allah. We praise Him and we seek help from Him. First and foremost, I
thank Him for giving me the ability to fulfill my wish to earn the Doctoral degree. I would like …