Analyzing ground-truth data of mobile gambling scams

G Hong, Z Yang, S Yang, X Liaoy, X Du… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
With the growth of mobile computing techniques, mobile gambling scams have seen a
rampant increase in the recent past. In mobile gambling scams, miscreants deliver …

{iOS}, your {OS}, everybody's {OS}: Vetting and analyzing network services of {iOS} applications

Z Tang, K Tang, M Xue, Y Tian, S Chen… - 29th USENIX Security …, 2020 - usenix.org
Smartphone applications that listen for network connections introduce significant security
and privacy threats for users. In this paper, we focus on vetting and analyzing the security of …

CydiOS: A Model-Based Testing Framework for iOS Apps

S Wu, J Li, H Zhou, Y Fang, K Zhao, H Wang… - Proceedings of the …, 2023 - dl.acm.org
To make an app stand out in an increasingly competitive market, developers must ensure its
quality to deliver a better user experience. UI testing is a popular technique for quality …

Detecting and measuring misconfigured manifests in android apps

Y Yang, M Elsabagh, C Zuo, R Johnson… - Proceedings of the …, 2022 - dl.acm.org
The manifest file of an Android app is crucial for app security as it declares sensitive app
configurations, such as access permissions required to access app components …

[PDF][PDF] When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality

K Cheng, A Bhattacharya, M Lin, J Lee… - USENIX Security …, 2024 - usenix.org
Augmented reality (AR) experiences place users inside the user interface (UI), where they
can see and interact with three-dimensional virtual content. This paper explores UI security …

Understanding and Detecting Abused Image Hosting Modules as Malicious Services

G Hong, M Wu, P Chen, X Liao, G Ye… - Proceedings of the 2023 …, 2023 - dl.acm.org
As a new type of underground ecosystem, the exploitation of Abused IHMs as MalIcious
sErvices (AIMIEs) is becoming increasingly prevalent among miscreants to host illegal …

Understanding and Identifying Cross-platform UI Framework based Potentially Unwanted Apps

Y Zhang, G Chen, Y Meng, H Zhu - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Cross-platform UI frameworks may facilitate a new category of Potentially Unwanted Apps,
dubbed XPUAs, which uses framework-specific language to implement its UI in the form of …

Automated binary analysis: A survey

Z Liu, C Chen, A Ejaz, D Liu, J Zhang - International Conference on …, 2022 - Springer
Binary code analysis is a process of analyzing the software or operating system when
source code is inaccessible. This scenario occurs when one needs to analyze malware, a …

[HTML][HTML] Measuring and Understanding Crowdturfing in the App Store

Q Hu, X Zhang, F Li, Z Tang, S Wang - Information, 2023 - mdpi.com
Application marketplaces collect ratings and reviews from users to provide references for
other consumers. Many crowdturfing activities abuse user reviews to manipulate the …

No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS

Y Zhao, L Yu, Y Sun, Q Liu, B Luo - Proceedings of the 32nd IEEE/ACM …, 2024 - dl.acm.org
The rise of malicious mobile applications poses a significant threat to users and app stores.
While iOS apps have generally been considered more secure due to strict review processes …