Android Rooting: Methods, Detection, and Evasion - San-Tsai Sun et al - San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.: - LERSSE-RefConfPaper-2015-007
 
People who viewed this page also viewed:
(435)  Surpass: System-initiated User-replaceable Passwords - Jun Ho Huh et al - Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.: - LERSSE-RefConfPaper-2015-006
(415)  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs - Yazan Boshmaf et al - Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.: - LERSSE-RefConfPaper-2014-004
(379)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(369)  Design and Analysis of a Social Botnet - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Design and Analysis of a Social Botnet. Elsevier Journal of Computer Network - Special Issue on Botnets, 2012.: - LERSSE-RefJnlPaper-2012-002
(364)  On the Impact of Touch ID on iPhone Passcodes - Ivan Cherapau et al - LERSSE-RefConfPaper-2015-001: - LERSSE-RefConfPaper-2015-001


Download history: