Abstract is missing.
- Hardware Isolation for Trusted ExecutionJan-Erik Ekberg. 1 [doi]
- Secure Containers in Android: The Samsung KNOX Case StudyUri Kanonov, Avishai Wool. 3-12 [doi]
- White Rabbit in Mobile: Effect of Unsecured Clock Source in SmartphonesShinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert. 13-21 [doi]
- What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android AppsWei Liu, Yueqian Zhang, Zhou Li, Hai-Xin Duan. 23-32 [doi]
- CRiOS: Toward Large-Scale iOS Application AnalysisDamilola Orikogbo, Matthias Büchler, Manuel Egele. 33-42 [doi]
- SecuRank: Starving Permission-Hungry Apps Using Contextual Permission AnalysisVincent F. Taylor, Ivan Martinovic. 43-52 [doi]
- Securing Recognizers for Rich Video ApplicationsChristopher Thompson, David Wagner. 53-62 [doi]
- On a (Per)Mission: Building Privacy Into the App MarketplaceHannah Quay-de la Vallee, Paige Selby, Shriram Krishnamurthi. 63-72 [doi]
- Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile AttacksSrishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru. 73-82 [doi]
- Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile BankingClaudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun. 83-92 [doi]
- Picasso: Lightweight Device Class Fingerprinting for Web ClientsElie Bursztein, Artem Malyshev, Tadek Pietraszek, Kurt Thomas. 93-102 [doi]
- Detecting Misuse of Google Cloud Messaging in Android BadwareMansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto. 103-112 [doi]
- On the CCA (in)Security of MTProtoJakob Jakobsen, Claudio Orlandi. 113-116 [doi]
- Analyzing TETRA Location Privacy and Network AvailabilityMartin Pfeiffer, Jan-Pascal Kwiotek, Jiska Classen, Robin Klose, Matthias Hollick. 117-122 [doi]