Computer Laboratory

Mobile security reading group

This is a reading group which meets at 10:00 every Wednesday during term in SW00 and discusses papers relevant to security and mobile devices.

Participants should sign up to the mailing list. The paper(s) to be read will be announced by the preceeding Friday so that people know what is being read sufficiently in advance that they can read it.

Paper Queue

This is the list of papers in our to read queue in the order we intend to read them

  1. From the Aether to the Ethernet — Attacking the Internet using Broadcast Digtal Television by Yossef Oren and Angelos D. Keromytis
  2. Laurent's draft paper
  3. NativeWrap: Ad Hoc Smartphone Application Creation for End Users by Adwait Nadkarni, Vasant Tendulkar and William Enck
  4. Code Injection Attacks on HTML5-based Mobile Apps by Xing Jin, Tongbo Luo, Derek G. Tsui, and Wenliang Du
  5. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks by Martin Georgiev, Suman Jana and Vitaly Shmatikov
  6. ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviours by Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio,Victor van der Veen, Christian Platzer
  7. A Large-Scale Analysis of the Security of Embedded Firmwares by Andrei Costin, Jonas Zaddach, Aurélien Francillon, and Davide Balzarotti
  8. On the Feasibility of Large-Scale Infections of iOS Devices by Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, and Wenke Lee
  9. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks by Qi Alfred Chen, Zhiyun Qian and Z. Morley Mao
  10. Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis by Mauro Conti, Luigi V. Mancini, Riccardo Spolaor and Nino V. Verde
  11. Exploiting Delay Patterns for User IPs Identification in Cellular Networks by Vasile Claudiu Perta, Marco Valerio Barbera and Alessandro Mei
  12. Fingerprinting Smart Devices Through Embedded Acoustic Components by Anupam Das, Nikita Borisov and Matthew Caesar
  13. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control your Phone by Wenrui Diao, Xiangyu Liu, Zhe Zhou and Kehuan Zhang

Read papers