Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

30 results
Keywords : Android
Image document

Ransomware Steals Your Phone. Formal Methods Rescue It

Francesco Mercaldo , Vittoria Nardone , Antonella Santone , Corrado Aaron Visaggio
36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.212-221, ⟨10.1007/978-3-319-39570-8_14⟩
Conference papers hal-01432919v1
Image document

Mobile Total Conversation – Communication for All, Everywhere

Erik Zetterström
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.362-363, ⟨10.1007/978-3-642-23768-3_32⟩
Conference papers hal-01596906v1
Image document

MyCarMobile: A Travel Assistance Emergency Mobile App for Deaf People

Tânia Rocha , Hugo Paredes , Diogo Soares , Benjamim Fonseca , João Barroso
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.56-65, ⟨10.1007/978-3-319-67744-6_4⟩
Conference papers hal-01676152v1
Image document

A Comparative Study of Younger and Older Adults’ Interaction with a Crowdsourcing Android TV App for Detecting Errors in TEDx Video Subtitles

Kinga Skorupska , Manuel Núñez , Wiesław Kopeć , Radosław Nielek
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.455-464, ⟨10.1007/978-3-030-29387-1_25⟩
Conference papers hal-02553883v1
Image document

Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps

Davide Caputo , Luca Verderame , Simone Aonzo , Alessio Merlo
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.121-139, ⟨10.1007/978-3-030-22479-0_7⟩
Conference papers hal-02384600v1
Image document

A Pre-processing Composition for Secret Key Recovery on Android Smartphone

Yuto Nakano , Youssef Souissi , Robert Nguyen , Laurent Sauvage , Jean-Luc Danger , et al.
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩
Conference papers hal-01400921v1
Image document

Secure Storage on Android with Context-Aware Access Control

Faysal Boukayoua , Jorn Lapon , Bart De Decker , Vincent Naessens
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers hal-01404184v1
Image document

Coping with Accessibility Challenges for Security - A User Study with Blind Smartphone Users

Sylvan Lobo , Ulemba Hirom , V. S. Shyama , Mridul Basumatori , Pankaj Doke
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.3-22, ⟨10.1007/978-3-319-68059-0_1⟩
Conference papers hal-01679788v1
Image document

“It’s Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser

Majid Hatamian , Agnieszka Kitkowska , Jana Korunovska , Sabrina Kirrane
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.198-215, ⟨10.1007/978-3-319-95729-6_13⟩
Conference papers hal-01954416v1
Image document

Impact of User Data Privacy Management Controls on Mobile Device Investigations

Panagiotis Andriotis , Theo Tryfonas
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.89-105, ⟨10.1007/978-3-319-46279-0_5⟩
Conference papers hal-01758690v1
Image document

Preserving Dates and Timestamps for Incident Handling in Android Smartphones

Robin Verma , Jayaprakash Govindaraj , Gaurav Gupta
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.209-225, ⟨10.1007/978-3-662-44952-3_14⟩
Conference papers hal-01393772v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1
Image document

A Tool for Volatile Memory Acquisition from Android Devices

Haiyu Yang , Jianwei Zhuge , Huiming Liu , Wei Liu
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.365-378, ⟨10.1007/978-3-319-46279-0_19⟩
Conference papers hal-01758679v1
Image document

MORENA: A Middleware for Programming NFC-Enabled Android Applications as Distributed Object-Oriented Programs

Andoni Lombide Carreton , Kevin Pinte , Wolfgang De Meuter
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.61-80, ⟨10.1007/978-3-642-35170-9_4⟩
Conference papers hal-01555556v1
Image document

AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics

Yonas Leguesse , Mark Vella , Joshua Ellul
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.140-152, ⟨10.1007/978-3-319-93524-9_9⟩
Conference papers hal-01875520v1
Image document

On Understanding Permission Usage Contextuality in Android Apps

Md Zakir Hossen , Mohammad Mannan
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.232-242, ⟨10.1007/978-3-319-95729-6_15⟩
Conference papers hal-01954415v1
Image document

NotificationManager: Personal Boundary Management on Mobile Devices

Tom Gross , Anna-Lena Mueller
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.243-261, ⟨10.1007/978-3-030-85610-6_15⟩
Conference papers hal-04215488v1
Image document

A Targeted Data Extraction System for Mobile Devices

Sudhir Aggarwal , Gokila Dorai , Umit Karabiyik , Tathagata Mukherjee , Nicholas Guerra , et al.
15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.73-100, ⟨10.1007/978-3-030-28752-8_5⟩
Conference papers hal-02534613v1
Image document

Quantitative Security Risk Assessment of Android Permissions and Applications

Yang Wang , Jun Zheng , Chen Sun , Srinivas Mukkamala
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.226-241, ⟨10.1007/978-3-642-39256-6_15⟩
Conference papers hal-01490707v1
Image document

DroidAutoML: A Microservice Architecture to Automate the Evaluation of Android Machine Learning Detection Systems

Yérom-David Bromberg , Louison Gitzinger
DAIS - 20th IFIP International Conference on Distributed Applications and Interoperable Systems, Jun 2020, Valletta, Malta. pp.148-165, ⟨10.1007/978-3-030-50323-9_10⟩
Conference papers hal-03223251v1
Image document

Comparing Sources of Location Data from Android Smartphones

Michael Spreitzenbarth , Sven Schmitt , Felix Freiling
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.143-157, ⟨10.1007/978-3-642-33962-2_10⟩
Conference papers hal-01523703v1
Image document

An Empirical Evaluation of Search Algorithms for App Testing

Leon Sell , Michael Auer , Christoph Frädrich , Michael Gruber , Philemon Werli , et al.
31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.123-139, ⟨10.1007/978-3-030-31280-0_8⟩
Conference papers hal-02526338v1
Image document

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

Daniel Schreckling , Joachim Posegga , Johannes Köstler , Matthias Schaff
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.208-223, ⟨10.1007/978-3-642-30955-7_18⟩
Conference papers hal-01534306v1
Image document

Data-Minimizing Authentication Goes Mobile

Patrik Bichsel , Jan Camenisch , Bart De Decker , Jorn Lapon , Vincent Naessens , et al.
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers hal-01540904v1
Image document

Forensic Analysis of Android Steganography Apps

Wenhao Chen , Yangxiao Wang , Yong Guan , Jennifer Newman , Li Lin , et al.
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.293-312, ⟨10.1007/978-3-319-99277-8_16⟩
Conference papers hal-01988836v1
Image document

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations

André Pereira , Manuel Correia , Pedro Brandão
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.19-32, ⟨10.1007/978-3-662-44885-4_2⟩
Conference papers hal-01404182v1
Image document

IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices

Mansour Ahmadi , Angelo Sotgiu , Giorgio Giacinto
1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.137-154, ⟨10.1007/978-3-319-66808-6_10⟩
Conference papers hal-01677144v1
Image document

A Recovery Approach for SQLite History Recorders from YAFFS2

Beibei Wu , Ming Xu , Haiping Zhang , Jian Xu , Yizhi Ren , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.295-299, ⟨10.1007/978-3-642-36818-9_30⟩
Conference papers hal-01480183v1
Image document

A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM

Panagiotis Andriotis , Theo Tryfonas , George Oikonomou , Irwin King
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.251-267, ⟨10.1007/978-3-319-24123-4_15⟩
Conference papers hal-01449062v1
Image document

Beddernet: Application-Level Platform-Agnostic MANETs

Rasmus Sidorovs Gohs , Sigurður Rafn Gunnarsson , Arne John Glenstrup
11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.165-178, ⟨10.1007/978-3-642-21387-8_13⟩
Conference papers hal-01583579v1