Mobile Security Research - 2017 Quarter 1 (Jan, Febr and March)
Presentations, articles, papers, ML (machine learning) on Mobile Security for the first quarter of 2017.
Enjoy!
Research & Papers & Presentations
- A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules - https://arxiv.org/abs/1702.03112
- Smartphone Secure Development Guidelines - ENISA - https://www.enisa.europa.eu/publications/smartphone-secure-development-guidelines-2016
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes: An Updated View on the Android Permission System". https://github.com/zyrikby/android_permission_evolution
- CVE-2017-0451 - https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/a9e71a13034d283d9bf0fb909039e99285c6db89
- Android Malware Behaviors - http://androidmalwaredataset.org/families
- Pinning - not as simple as it sounds - https://koz.io/android-pinning-bugs/
- Killer Mobile: Tracking American Android And iOS Spyware In Russia - https://medium.com/@TFoxBrewster/killer-mobile-tracking-american-android-and-ios-spyware-in-russia-b73cfb2ded75#.kc2j8oq8f
- Identifying Mobile Repackaged Applications through Formal Methods - https://www.researchgate.net/profile/Francesco_Mercaldo/publication/313895751_Identifying_Mobile_Repackaged_Applications_through_Formal_Methods/links/58aeb006aca2725b540df863/Identifying-Mobile-Repackaged-Applications-through-Formal-Methods.pdf
- Computational intelligence anti-malware framework for android OS - https://link.springer.com/article/10.1007/s40595-017-0095-3
- Mobile Malware detection with permissions and intents analysis - http://www.hotmobile.org/2017/papers/posters/FauziaIdreesAbro.pdf
- A Case Study on Intrusion Detection on Mobile Security using SIM and PDA - http://www.conferenceinfo.org/admin/resources/project/paper/f201612151481786965.pdf
- NDSS 2017 - Dark Hazard: Learning-based, Large-scale Discovery of Hidden Sensitive Operations in Android Apps - http://www.cs.ucr.edu/~heng/pubs/ndss2017.pdf
- Understanding Android App Piggybacking - http://orbilu.uni.lu/bitstream/10993/30027/1/article.pdf
- Automatically Locating Malicious Packages in Piggybacked Android Apps - http://orbilu.uni.lu/bitstream/10993/30028/1/article.pdf
- NDSS 2017 - Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps - https://www.internetsociety.org/sites/default/files/ndss2017_05A-2_Yang_paper.pdf
- Android 7 File Based Encryption and the Attacks Against It - http://work.delaat.net/rp/2016-2017/p45/report.pdf
- WindowGuard: Systematic Protection of GUI Security in Android - http://www.cse.psu.edu/~sxz16/papers/ndss2017.pdf
- Anti-Debugging Fun With Android ART - http://www.vantagepoint.sg/blog/88-anti-debugging-fun-with-android-art
Machine Learning
- Deep Learning-based Mechanism for Android Malware Detection - http://mit.twman.org/TonTon-Hsien-De-Huang/research/deeplearning/deepdroid
Articles
- Hacking Android phone. How deep the rabbit hole goes - https://medium.com/@kayrus/hacking-android-phone-how-deep-the-rabbit-hole-goes-18b62ad65727#.9gknw149y
- HACKING ANDROID APPS WITH FRIDA I - https://www.codemetrix.net/hacking-android-apps-with-frida-1/
- Mobile Security News Update March 2017 - https://www.mulliner.org/blog/blosxom.cgi/2017/03/07#mobile_security_news_update_march2017
- How Mobile Phones Turn Into A Corporate Threat - http://blog.trendmicro.com/trendlabs-security-intelligence/mobile-phones-turn-corporate-threat/
- Forensics Investigation of Android Phone using Andriller - http://www.hackingarticles.in/forensics-investigation-of-android-phone-using-andriller/
- Trojan analysis of the virus: advertising SDK behind the magic hand - http://bobao.360.cn/learning/detail/3676.html (Chinese)
Tools & Frameworks & Source Code
- Firehash - is a security solution that prevents hackers' attacks based on cutting-edge technology - https://firehash.grayhash.com/
- Gnirehtet provides reverse tethering for Android - https://github.com/Genymobile/gnirehtet
No comments:
Post a Comment