Abstract is missing.
- Security composition in the real world: squaring the circle of mobile security with contemporary device economicsJon A. Geater. 1-2 [doi]
- Deadbolt: locking down android disk encryptionAdam Skillen, David Barrera, Paul C. van Oorschot. 3-14 [doi]
- Native code execution control for attack mitigation on androidRafael Fedler, Marcel Kulicke, Julian Schütte. 15-20 [doi]
- Sound and precise malware analysis for android via pushdown reachability and entry-point saturationShuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, Petey Aldous, David Van Horn. 21-32 [doi]
- The curse of 140 characters: evaluating the efficacy of SMS spam detection on androidAkshay Narayan, Prateek Saxena. 33-42 [doi]
- This network is infected: HosTaGe - a low-interaction honeypot for mobile devicesEmmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Mühlhäuser, Mihai Plasoianu, Lars Pandikow, Wulf Pfeiffer. 43-48 [doi]
- AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectorsFederico Maggi, Andrea Valdi, Stefano Zanero. 49-54 [doi]
- Sleeping android: the danger of dormant permissionsJames Sellwood, Jason Crampton. 55-66 [doi]
- PIN skimmer: inferring PINs through the camera and microphoneLaurent Simon, Ross Anderson. 67-78 [doi]
- A case of collusion: a study of the interface between ad libraries and their appsTheodore Book, Dan S. Wallach. 79-86 [doi]
- Please slow down!: the impact on tor performance from mobilityStephen Doswell, Nauman Aslam, David Kendall, Graham Sexton. 87-92 [doi]
- Secure enrollment and practical migration for mobile trusted execution environmentsClaudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun. 93-98 [doi]
- Securitas: user identification through RGB-NIR camera pair on mobile devicesShijia Pan, An Chen, Pei Zhang. 99-104 [doi]
- Passwords and interfaces: towards creating stronger passwords by using mobile phone handsetsS. M. Taiabul Haque, Matthew Wright, Shannon Scielzo. 105-110 [doi]