Abstract is missing.
- Samsung KNOX and Enterprise Mobile SecurityPeng Ning. 1 [doi]
- QR Inception: Barcode-in-Barcode AttacksAdrian Dabrowski, Katharina Krombholz, Johanna Ullrich, Edgar R. Weippl. 3-10 [doi]
- Analysis of Secure Key Storage Solutions on AndroidTim Cooijmans, Joeri de Ruiter, Erik Poll. 11-20 [doi]
- Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones Steven Arzt, Stephan Huber, Siegfried Rasthofer, Eric Bodden. 21-26 [doi]
- LazyTainter: Memory-Efficient Taint Tracking in Managed RuntimesZheng Wei, David Lie. 27-38 [doi]
- A5: Automated Analysis of Adversarial Android ApplicationsTimothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, Patrick Tague. 39-50 [doi]
- PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile DevicesRaphael Spreitzer. 51-62 [doi]
- Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your PhoneWenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang. 63-74 [doi]
- Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social DiscoveryYuan Ding, Sai Teja Peddinti, Keith W. Ross. 75-80 [doi]
- Efficient Smart Phone Forensics Based on Relevance FeedbackSaksham Varma, Robert J. Walls, Brian Lynn, Brian Neil Levine. 81-91 [doi]
- Cassandra: Towards a Certifying App Store for AndroidSteffen Lortz, Heiko Mantel, Artem Starostin, Timo Bähr, David Schneider, Alexandra Weber. 93-104 [doi]
- OASIS: Operational Access Sandboxes for Information SecurityMauro Conti, Earlence Fernandes, Justin Paupore, Atul Prakash, Daniel Simionato. 105-110 [doi]