Abstract is missing.
- Lockpicking physical layer key exchange: weak adversary models invite the thiefDaniel Steinmetzer, Matthias Schulz, Matthias Hollick. 1 [doi]
- UWB rapid-bit-exchange system for distance boundingNils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn, Srdjan Capkun. 2 [doi]
- HB+DB, mitigating man-in-the-middle attacks against HB+ with distance boundingElena Pagnin, Anjia Yang, Gerhard P. Hancke, Aikaterini Mitrokotsa. 3 [doi]
- Freedom of speech: thwarting jammers via a probabilistic approachRoberto Di Pietro, Gabriele Oligeri. 4 [doi]
- DroidJust: automated functionality-aware privacy leakage analysis for Android applicationsXin Chen, Sencun Zhu. 5 [doi]
- CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managersDaibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng. 6 [doi]
- A measurement study of tracking in paid mobile applicationsSuranga Seneviratne, Harini Kolamunna, Aruna Seneviratne. 7 [doi]
- How talkative is your mobile device?: an experimental study of Wi-Fi probe requestsJulien Freudiger. 8 [doi]
- DroidEagle: seamless detection of visually similar Android appsMingshen Sun, Mengmeng Li, John C. S. Lui. 9 [doi]
- AppWatcher: unveiling the underground market of trading mobile app reviewsZhen Xie, Sencun Zhu. 10 [doi]
- Securacy: an empirical investigation of Android applications' network usage, privacy and securityDenzil Ferreira, Vassilis Kostakos, Alastair R. Beresford, Janne Lindqvist, Anind K. Dey. 11 [doi]
- Security and system architecture: comparison of Android customizationsRoberto Gallo, Patricia Hongo, Ricardo Dahab, Luiz C. Navarro, Henrique Kawakami, Kaio Galvão, Glauber Junqueira, Luander Ribeiro. 12 [doi]
- Injection attacks on 802.11n MAC frame aggregationPieter Robyns, Peter Quax, Wim Lamotte. 13 [doi]
- A practical investigation of identity theft vulnerabilities in EduroamSebastian Brenza, Andre Pawlowski, Christina Pöpper. 14 [doi]
- Danger is my middle name: experimenting with SSL vulnerabilities in Android appsLucky Onwuzurike, Emiliano De Cristofaro. 15 [doi]
- SHIELD: a data verification framework for participatory sensing systemsStylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos. 16 [doi]
- Liveness verifications for citizen journalism videosMahmudur Rahman, Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar. 17 [doi]
- How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaLMarcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi. 18 [doi]
- A framework for evaluating pseudonym strategies in vehicular ad-hoc networksDavid Förster, Frank Kargl, Hans Löhr. 19 [doi]
- Device-to-identity linking attack using targeted wi-fi geolocation spoofingCélestin Matte, Jagdish Prasad Achara, Mathieu Cunche. 20 [doi]
- CAPS: context-aware privacy scheme for VANET safety applicationsKarim Emara, Wolfgang Woerndl, Johann H. Schlichter. 21 [doi]
- Is your commute driving you crazy?: a study of misbehavior in vehicular platoonsBruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, Patrick Tague. 22 [doi]
- Harvesting developer credentials in Android appsYajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang. 23 [doi]
- TextLogger: inferring longer inputs on touch screen using motion sensorsDan Ping, Xin Sun, Bing Mao. 24 [doi]
- WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android appsXingmin Cui, Jingxuan Wang, Lucas Chi Kwong Hui, Zhongwei Xie, Tian Zeng, Siu-Ming Yiu. 25 [doi]
- Applying the protection goals for privacy engineering to mobile devicesMeiko Jensen. 26 [doi]
- NFCGate: an NFC relay application for AndroidMax Maass, Uwe Müller, Tom Schons, Daniel Wegemer, Matthias Schulz. 27 [doi]
- A hybrid approach for mobile security threat analysisWanqing You, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Ying Qian, Lixin Tao. 28 [doi]
- Security by mobility in location and track verificationMatthias Schäfer 0002, Daniel S. Berger, Vincent Lenders, Jens B. Schmitt. 29 [doi]
- Study of compliance of Android location APIs with GeoprivPradeep Podiyan, Sergey Butakov, Pavol Zavarsky. 30 [doi]
- SpotShare and nearbyPeople: applications of the Social PaL frameworkMarcin Nagy, Thanh Bui, Swapnil Udar, N. Asokan, Jörg Ott. 31 [doi]
- Physical layer location privacy issue in wireless small cell networksSadegh Farhang, Yezekael Hayel, Quanyan Zhu. 32 [doi]
- SVM-based malware detection for Android applicationsGuqian Dai, Jigang Ge, Minghang Cai, Daoqian Xu, Wenjia Li. 33 [doi]
- Device analyzer: a privacy-aware platform to support research on the Android ecosystemDaniel T. Wagner, Daniel R. Thomas, Alastair R. Beresford, Andrew C. Rice. 34 [doi]