-
Notifications
You must be signed in to change notification settings - Fork 80
Android Whitepapers
Jacob Soo edited this page Jul 24, 2014
·
64 revisions
Title | Notes | Release Date | Authors | Links |
---|---|---|---|---|
Android Forensics | Mobile Forensics World 2009 | Andrew Hoog | https://viaforensics.com/wpinstall/wp-content/uploads/2009/08/Android-Forensics-Andrew-Hoog-viaForensics.pdf | |
Exploratory Android Surgery | Black Hat USA 2009 | Jesse Burns | http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-PAPER.pdf http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-SLIDES.pdf | |
Reconstructing Dalvik applications | HiTB Dubai 2010 | Marc Schonefeld | http://conference.hitb.org/hitbsecconf2010dxb/materials/D2%20-%20Marc%20Schonefeld%20-%20undx2.pdf | |
Building Android Sandcastles in Android's Sandbox | Black Hat Abu Dhabi 2010 | Nils | http://media.blackhat.com/bh-ad-10/Nils/Black-Hat-AD-2010-android-sandcastle-slides.pdf https://media.blackhat.com/bh-ad-10/Nils/Black-Hat-AD-2010-android-sandcastle-wp.pdf | |
Taming Information-Stealing Smartphone Applications (on Android) | Yajin Zhou, Xinwen Zhang, Xuxian Jiang & Vincent W. Freeh | http://www.cs.ncsu.edu/faculty/jiang/pubs/TRUST11.pdf | ||
Don't Root Robots | BSides Detroit 2011 | Jon Oberheide & Zach Lanier | https://jon.oberheide.org/files/bsides11-dontrootrobots.pdf | |
Beating up on Android [Practical Android Attacks] | Infiltrate 2011 | Bas Alberts & Massimiliano Oldani | http://www.infiltratecon.net/infiltrate/archives/Android_Attacks.pdf | |
This is REALLY not the Droid you’re looking for… | Defcon 2011 | Nicholas J. Percoco & Sean Schulte | https://www.defcon.org/images/defcon-19/dc-19-presentations/Percoco-Spiderlabs/DEFCON-19-Percoco-Spiderlabs-Droid.pdf https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20presentations/Percoco-Spiderlabs/Extras/DEFCON-19-Percoco-Droid-BanthaPudu-1.0.apk https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Nicholas%20Percoco%20and%20Sean%20Schulte%20-%20This%20is%20REALLY%20not%20the%20droid%20youre%20looking%20for%20-%20Slides.m4v https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20video%20and%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Nicholas%20Percoco%20and%20Sean%20Schulte%20-%20This%20is%20REALLY%20not%20the%20droid%20youre%20looking%20for%20-%20Video%20and%20Slides.m4v | |
Seven Ways to Hang Yourself with Google Android | Defcon 2011 | Yekaterina Tsipenyuk O'Neil & Erika Chin | https://www.defcon.org/images/defcon-19/dc-19-presentations/O'Neil-Chin/DEFCON-19-O'Neil-Chin-Google-Android.pdf https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Yekaterina%20Tsipenyuk%20ONeil%20and%20Erika%20Chin%20-%20Seven%20Ways%20to%20Hang%20Yourself%20with%20Google%20Android%20-%20Slides.m4v https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20video%20and%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Yekaterina%20Tsipenyuk%20ONeil%20and%20Erika%20Chin%20-%20Seven%20Ways%20to%20Hang%20Yourself%20with%20Google%20Android%20-%20Video%20and%20Slides.m4v | |
Security Issues in Android Custom Rom's | c0c0n 2011 | 17 Oct 2011 | Anant Shrivastava | http://anantshri.info/articles/android_cust_rom_security.html |
A framework for on-device privilege escalation exploit execution on Android | Sebastian Höbarth & Rene Mayrhofer | http://www.mobilefactory.at/wordpress/wp-content/uploads/IWSSI2011-Android-Exploit-Framework-1.pdf https://www.mayrhofer.eu.org/downloads/presentations/2011-06-16_IWSSI_Android-Exploit-Framework.pdf | ||
Popping Shell on A(ndroid)RM Devices | BlackHat DC 2011 | ITZHAK AVRAHAM | https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham_ARM%20Exploitation-wp.2.0.pdf https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham-Popping_Android_Devices-Slides.pdf | |
Yet Another Android Rootkit | Black Hat Abu Dhabi 2011 | Tsukasa Oi | https://media.blackhat.com/bh-ad-11/Oi/bh-ad-11-Oi-Android_Rootkit-WP.pdf https://media.blackhat.com/bh-ad-11/Oi/bh-ad-11-Oi-Android_Rootkit-Slides.pdf | |
How Security is Broken? : Android Internals and Malware Infection Possibility | PacSec 2011 | Tsukasa Oi | http://pacsec.jp/psj11/PacSec2011_How-Security-is-Broken_en.pdf | |
Android: From Reversing to Decompilation | Black Hat Abu Dhabi 2011 | Anthony Desnos & Georoy Gueguen | http://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_WP.pdf https://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Slides.pdf | |
Bypassing the Android Permission Model | Hack In Paris 2011 | Georgia Weidman | http://hackinparis.com/slides/hip2k12/Georgia-androidpermissions.pdf | |
"I Know Kung-Fu!": Analyzing Mobile Malware | HiTB KUL 2011 | Alex Kirk | http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Alex%20Kirk%20-%20Mobile%20Malware%20Analysis.pdf | |
Reversing Android Malware | HiTB KUL 2011 | Mahmud Ab Rahman | http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Mahmud%20Ab%20Rahman%20-%20Reverse%20Engineering%20Android%20Malware.pdf | |
Exploiting Androids for Fun and Profit | HiTB KUL 2011 | Riley Hassell | http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Riley%20Hassell%20-%20Exploiting%20Androids%20for%20Fun%20and%20Profit.pdf | |
Blackbox Android | HiTB KUL 2011 | Marc Blanchou & Mathew Solnik | http://conference.hitb.org/hitbsecconf2011kul/materials/D2T1%20-%20Marc%20Blanchou%20and%20Mathew%20Solnik%20-%20Blackbox%20Android.pdf | |
Popping Shell on A(ndroid)RM Devices | HiTB AMS 2011 | Itzhak (Zuk) Avraham | http://conference.hitb.org/hitbsecconf2011ams/materials/D1T3%20-%20Itzhak%20Zuk%20Avraham%20-%20Popping%20Shell%20On%20Android%20Devices.pdf | |
Android - Bytecode Obfuscation bringing x86 fuckups to dalvik | Patrick Schulz | http://www.sec.t-labs.tu-berlin.de/spring/content/spring7_14_slides_schulz.pdf | ||
Android Application Reverse Engineering & Defenses | Patrick Schulz & Felix Matenaar | http://bluebox.com/wp-content/uploads/2013/05/AndroidREnDefenses201305.pdf | ||
Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces | CODASPY 2012 | Wu Zhou, Yajin Zhou, Xuxian Jiang & Peng Ning | http://www.csc.ncsu.edu/faculty/jiang/pubs/CODASPY12.pdf | |
Dissecting Android Malware: Characterization and Evolution | Oakland 2012 | Yajin Zhou & Xuxian Jiang | http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf | |
RiskRanker: Scalable and Accurate Zero-day Android Malware Detection | MOBISYS 2012 | Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou & Xuxian Jiang | http://www.cs.ncsu.edu/faculty/jiang/pubs/MOBISYS12.pdf | |
Sleeping Android : Exploit through Dormant Permission Requests | 28th August 2012 | James Sellwood | http://www.escapades-in-security.com/files/sleeping_android_release.pdf | |
Mobile Exploit Intelligence Project | 19th April 2012 | Dan Guido & Mike Arpaia | http://www.trailofbits.com/resources/mobile_eip-04-19-2012.pdf https://media.blackhat.com/bh-eu-12/Guido/bh-eu-12-GuidoArpaia-Mobile_Exploit_Intelligence_Project.mp4 | |
The Heavy Metal That Poisoned the Droid | Black Hat Europe 2012 | Tyrone Erasmus | https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-WP.pdf https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-Slides.pdf https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy_Metal_That_Posioned_Droid.mp4 | |
Dex Education: Practicing Safe Dex | Black Hat USA 2012 | 26th July 2012 | Tim Strazzere | http://www.strazzere.com/papers/DexEducation-PracticingSafeDex.pdf |
Cracking Open the Phone: An Android Malware Automated Analysis Primer | RSA Conference 2012 | Armando Orozco & Grayson Milbourne | http://www.rsaconference.com/writable/presentations/file_upload/ht2-303.pdf | |
Deceiving Permissions - Rules for Android Malware Detection | RSA Conference 2012 | Vanja Svajcer | http://www.rsaconference.com/writable/presentations/file_upload/mbs-210_svajcer.pdf | |
UI Redressing Attacks on Android Devices | Black Hat Abu Dhabi 2012 | Marcus Niemietz | https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-slides.pdf https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-WP.pdf | |
Tackling the Android Challenge | RuxconBreakpoint 2012 | Joshua J. Drake | http://2012.ruxconbreakpoint.com/assets/Uploads/bpx/Tackling%20the%20Android%20Challenge.pptx | |
Reducing the Window of Opportunity for Android Malware | EICAR Conference | May 2012 | Axelle Apvrille & Tim Strazzere | http://www.fortiguard.com/files/slidesdroid.pdf |
Guns and Smoke to Defeat Mobile Malware | HashDays 2012 | November 2012 | Axelle Apvrille | http://www.fortiguard.com/files/hashdays.pdf |
Mapping & Evolution of Android Permissions | CounterMeasure 2012 | Zach Lanier & Andrew Reiter | http://www.countermeasure2012.com/presentations/LANIER_REITER.pdf | |
Into The Droid - Gaining Access to Android User Data | Defcon 2012 | Thomas Cannon | https://www.defcon.org/images/defcon-20/dc-20-presentations/Cannon/DEFCON-20-Cannon-Into-The-Droid.pdf | |
Fast, Scalable Detection of “Piggybacked” Mobile Applications | CODASPY 2013 | Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang & Shihong Zou | http://www.csc.ncsu.edu/faculty/jiang/pubs/CODASPY13.pdf | |
Playing Hide and Seek with Dalvik Executables | Hacktivity 2013 | Axelle Apvrille | https://www.fortiguard.com/uploads/general/Hidex_Paper.pdf | |
Android Hax | Jon Oberheide | https://jon.oberheide.org/files/summercon10-androidhax-jonoberheide.pdf | ||
Anatomy of a Remote Kernel Exploit | Dan Rosenberg | http://vulnfactory.org/research/h2hc-remote.pdf | ||
PatchDroid: Scalable Third-Party Security Patches for Android Devices | Collin Mulliner, Jon Oberheide, William Robertson & Engin Kirda | http://www.mulliner.org/collin/academic/publications/patchdroid.pdf | ||
Android OEM's applications (in)security and backdoors without permission | Andre Moulu | http://www.quarkslab.com/dl/Android-OEM-applications-insecurity-and-backdoors-without-permission.pdf | ||
The Impact of Vendor Customizations on Android Security | Computer and Communications Security 2013 | Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu & Xuxian Jiang | http://www.cs.ncsu.edu/faculty/jiang/pubs/CCS13.pdf | |
An Android Hacker's Journey: Challenges in Android Security Research | CanSecWest 2013 | Joshua J. Drake | https://cansecwest.com/slides/2013/An%20Android%20Hacker's%20Journey-%20Challenges%20in%20Android%20Security%20Research.pptx | |
Nifty stuff that you can still do with Android | HES 2013 | 2nd May 2013 | Xavier 'xEU' Martin | http://2013.hackitoergosum.org/presentations/Day1-05.Nifty%20stuff%20that%20you%20can%20still%20do%20with%20Android%20by%20Xavier%20Martin.pdf |
Android: From Rooting to Pwning | July 2013 | Acexor | http://hackmiami.org/wp-content/uploads/2013/07/AndroidSec.pdf | |
The Droid Exploitation SAGA | RSA Asia-Pacific Conference 2013 | ADITYA GUPTA & SUBHO HALDER | https://www.rsaconference.com/writable/presentations/file_upload/mbs-t01_final_v2.pdf | |
How to Build a SpyPhone | BlackHat USA 2013 | Kevin McNamee | https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-WP.pdf https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf | |
Lets Play Applanting | BlackHat Europe 2013 | Ajit Hatti | https://media.blackhat.com/eu-13/briefings/Hatti/bh-eu-13-lets-play-hatti-wp.pdf https://media.blackhat.com/eu-13/briefings/Hatti/bh-eu-13-lets-play-hatti-slides.pdf | |
Off Grid communications with Android | BlackHat Europe 2013 | Josh Thomas | https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-wp.pdf https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-slides.pdf | |
ANDROID: ONE ROOT TO OWN THEM ALL | BlackHat USA 2013 | Jeff Forristal | https://media.blackhat.com/us-13/US-13-Forristal-Android-One-Root-to-Own-Them-All-Slides.pdf | |
ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS | BlackHat USA 2013 | Daniel Peck | https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-WP.pdf https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-Slides.pdf | |
Reversing and Auditing Android’s Proprietary Bits | Recon 2013 | 23rd June 2013 | Joshua J. Drake | http://recon.cx/2013/slides/Recon2013-Joshua%20J.%20Drake-Reversing%20and%20Auditing%20Android's%20Proprietary%20Bits-public.pdf |
Android games + free Wi-Fi = Privacy leak | PacSec 2013 | Takayuki Sugiura & Yosuke Hasegawa | http://pacsec.jp/psj13/psj2013-day1_Sugiura-Hasegawa_pacsec_EJ.pptx.pdf | |
Defeating the protection mechanism on Android platform | PacSec 2013 | Tim Xia | http://pacsec.jp/psj13/psj2013-day2_Xia_Defeating_App%20protections_on_Android.pptx.pdf | |
Defeating Security Enhancements (SE) for Android | Defcon 2013 | Pau Oliva Fora | https://www.defcon.org/images/defcon-21/dc-21-presentations/Fora/DEFCON-21-Fora-Defeating-SEAndroid.pdf | |
Playing Hide and Seek with Dalvik Executables | Hack.Lu 2013 | October 2013 | Axelle Apvrille | https://www.fortiguard.com/uploads/general/Hidex_Slides.pdf |
Abusing Dalvik Beyond Recognition | Hack.Lu 2013 | October 2013 | Jurriaan Bremer | http://archive.hack.lu/2013/AbusingDalvikBeyondRecognition.pdf |
Android: Game of Obfuscation | H2HC 2013 | Jurriaan Bremer & Rodrigo Chiossi | http://androidxref.com/files/bremer_chiossi_h2hc2013.pdf | |
Automated Analysis and Deobfuscation of Android Apps & Malware | AthCon 2013 | Jurriaan Bremer | http://jbremer.org/wp-posts/athcon.pdf | |
Android DDI: Introduction to Dynamic Dalvik Instrumentation | HiTB KUL 2013 | October 2013 | Collin Mulliner | http://www.mulliner.org/android/feed/mulliner_dbi_hitb_kul2013.pdf |
TraceDroid: A Fast and Complete Android Method Tracer | HiTB KUL 2013 | October 2013 | Victor van der Veen | http://conference.hitb.org/hitbsecconf2013kul/materials/D2T2%20-%20Victor%20van%20der%20Veen%20-%20A%20Fast%20and%20Complete%20Android%20Method%20Tracer.pdf |
DEX EDUCATION 201 ANTI-EMULATION | HITCON 2013 | 19th July 2013 | Tim Strazzere | http://hitcon.org/2013/download/Tim%20Strazzere%20-%20DexEducation.pdf |
Android Hooking Attack | HITCON 2013 | 19th July 2013 | Minpyo Hong & Dongcheol Hong | http://hitcon.org/2013/download/[I2]%20Secret%20-%20AndroidHooking.pdf |
Review of Security Vulnerabilities on the Android Platform | HITCON 2013 | 19th July 2013 | Claud Xiao | http://hitcon.org/2013/download/[F1]%20Claud-HITCON2013-0709.pdf |
Escaping Android Dynamic Analysis; Chinese New Year Train Ticket Ordering Day | HITCON 2013 | 19th July 2013 | 趙閩 & 倪超 | http://hitcon.org/2013/download/[G1]%20%E8%B6%99%E6%95%8F%E5%80%AA%E8%B6%85,%E9%80%83%E9%9B%A2%E5%AE%89%E5%8D%93%E6%B4%9E%E5%8B%95%E6%85%8B%E6%AA%A2%E6%B8%AC,%20%E8%A8%82%E7%A5%A8%E5%8A%A9%E6%89%8B%E4%B8%80%E6%97%A5%E8%AB%87.pdf |
Droid Rage - Android exploitation on steroids | EkoParty 2013 | Pablo Sole & Agustin Gianni | http://ekoparty.org/archive/2013/charlas/Gianni_droid_rage.pdf | |
TaintDroid - An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones | OSDI'10 | William Enck, et. al | http://appanalysis.org/tdroid10.pdf | |
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications | OSDI'10 | Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna | https://seclab.cs.ucsb.edu/media/uploads/papers/2014_ndss_android-remote-code-execution.pdf | |
Woodpecker - Systematic Detection of Capability Leaks in Stock Android Smartphones | NCSU | Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang | http://www.csc.ncsu.edu/faculty/jiang/pubs/NDSS12_WOODPECKER.pdf | |
Android Security Vulnerabilities and Exploits | XDA Devcon 2013 | Justin Case | http://forum.xda-developers.com/attachment.php?attachmentid=2182689&d=1376275794 http://www.youtube.com/watch?v=NUGwVUU61Vg | |
Structural Detection of Android Malware using Embedded Call Graphs | AiSec 2013 | Hugo Gascon, Fabian Yamaguchi, Daniel Arp & Konrad Rieck | http://filepool.informatik.uni-goettingen.de/publication/sec//2013b-aisec.pdf | |
Android Anti-forensics: Modifying CyanogenMod | HICSS 2014 | Jan 2014 | Karl-Johan Karlsson, William Bradley Glisson | http://www.computer.org/csdl/proceedings/hicss/2014/2504/00/2504e828.pdf |
Mobile Analysis Kung Fu, Santoku Style | RSA Conference 2014 | Andrew Hoog & Sebastián Guerrero | http://www.rsaconference.com/writable/presentations/file_upload/anf-w03-mobile-analysis-kung-fu-santoku-style_v2.pdf | |
Beginners Guide to Reverse Engineering Android Apps | RSA Conference 2014 | Pau Oliva Fora | http://www.rsaconference.com/writable/presentations/file_upload/stu-w02b-beginners-guide-to-reverse-engineering-android-apps.pdf | |
Reverse Engineering, Pentesting and Hardening of Android Apps | DroidCon 2014 | Marco Grassi | https://speakerd.s3.amazonaws.com/presentations/25bc54e0728001318b20063debaef239/DroidconIT2014.pdf | |
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket | NDSS 2014 | 23rd-26th Feb 2014 | Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon & Konrad Rieck | http://filepool.informatik.uni-goettingen.de/publication/sec//2014-ndss.pdf |
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications | NDSS 2014 | 23rd-26th Feb 2014 | Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna | https://anonymous-proxy-servers.net/paper/android-remote-code-execution.pdf |
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications | NDSS 2014 | 23rd-26th Feb 2014 | Mu Zhang, Heng Yin | http://sycurelab.ecs.syr.edu/~mu/AppSealer-ndss14.pdf |
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps | NDSS 2014 | 23rd-26th Feb 2014 | David Sounthiraraj, Justin Sahs, Zhiqiang Lin, Latifur Khan, Garrett Greenwood | https://www.utdallas.edu/~zxl111930/file/NDSS14b.pdf |
AirBag: Boosting Smartphone Resistance to Malware Infection | NDSS 2014 | 23rd-26th Feb 2014 | Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang | http://yajin.org/papers/ndss14_airbag.pdf |
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android | NDSS 2014 | 23rd-26th Feb 2014 | Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl Gunter | http://sharps.org/wp-content/uploads/NAVEED-NDSS.pdf |
Screenmilker: How to Milk Your Android Screen for Secrets | NDSS 2014 | 23rd-26th Feb 2014 | Chia-Chi Lin, Hongyang Li, Xiaoyong Zhou, XiaoFeng Wang | http://www.ews.uiuc.edu/~hli52/paper/ndss2014-final49.pdf |
PREC: Practical Root Exploit Containment for Android Devices | CODASPY 2014 | March 2014 | Tsung-Hsuan Ho, Daniel Dean, Xiaohui Gu, William Enck | http://dance.csc.ncsu.edu/papers/codespy14.pdf |
Compac: Enforce Component Level Access Control in Android | CODASPY 2014 | March 2014 | Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu and Wenliang Du | http://www.cis.syr.edu/~wedu/Research/paper/compac_codaspy2014.pdf |
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform | CODASPY 2014 | March 2014 | Wu Zhou, Zhi Wang, Yajin Zhou and Xuxian Jiang | http://yajin.org/papers/codaspy14_divilar.pdf |
Systematic Audit of Thirty-Party Android Phones | CODASPY 2014 | March 2014 | Michael Mitchell, Guanyu Tian and Zhi Wang | http://www.cs.fsu.edu/~zwang/files/codaspy14_1.pdf |
DroidBarrier: Know What is Executing on Your Android | CODASPY 2014 | March 2014 | Hussain Almohri, Danfeng Yao and Dennis Kafura | http://people.cs.vt.edu/danfeng/papers/spy008-almohri.pdf |
Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware | EuroSec 2014 | 13th April 2014 | Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis, | |
Michalis Polychronakis | http://www.syssec-project.eu/m/documents/eurosec14/RATVM.pdf http://users.ics.forth.gr/~elathan/papers/eurosec14.pdf | |||
Pentesting Android Applications | Confraria Segurança PT 5/2014 | May 2014 | Cláudio André | http://www.slideshare.net/clviper/pentesting-android-applications |
From Zygote to Morula: Fortifying Weakened ASLR on Android | Oakland 2014 | May 2014 | Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee | http://www.cc.gatech.edu/~blee303/paper/morula.pdf |
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating | Oakland 2014 | May 2014 | Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, XiaoFeng Wang | http://www.informatics.indiana.edu/xw7/papers/privilegescalationthroughandroidupdating.pdf |
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations | Oakland 2014 | May 2014 | Xiaoyong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, Xiaofeng Wang | http://www.cs.indiana.edu/~zhou/files/sp14_zhou.pdf |
Post-Mortem Memory Analysis of Cold-Booted Android Devices | IMF 2014 | 12th-14th May 2014 | Christian Hilgers, Holger Macht, Tilo Muller, Michael Spreitzenbarth | http://www.homac.de/publications/Post-Mortem-Memory-Analysis-of-Cold-Booted-Android-Devices.pdf http://www.homac.de/publications/Post-Mortem-Memory-Analysis-of-Cold-Booted-Android-Devices-slides.pdf |
Execute this! Looking into code-loading techniques on Android | Honeynet Project Workshop 2014 | 12th-14th May 2014 | Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna | http://warsaw2014.honeynet.org/slides/honeynet2014-day1-Sebastian.pdf |
Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android | CarolinaCon 10 2014 | 16th-18th May 2014 | Jake Valletta | http://thecobraden.com/uploads/Valletta%20-%20CarolinaCon%20X%20-%20Exploiting%20the%20Bells%20and%20Whistles.pdf |
Enter Sandbox: Android Sandbox Comparison | MOBILE SECURITY TECHNOLOGIES 2014 | 17th May 2014 | Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani and Edgar Weippl | http://mostconf.org/2014/papers/s3p1.pdf http://mostconf.org/2014/slides/s3p1-slides.pdf |
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities | MOBILE SECURITY TECHNOLOGIES 2014 | 17th May 2014 | Vasant Tendulkar and William Enck | http://mostconf.org/2014/papers/s2p1.pdf http://mostconf.org/2014/slides/s2p1-slides.pptx |
Andlantis: Large-scale Android Dynamic Analysis | MOBILE SECURITY TECHNOLOGIES 2014 | 17th May 2014 | Michael Bierma, Eric Gustafson, Jeremy Erickson, David Fritz and Yung Ryn Choe | http://mostconf.org/2014/papers/s3p2.pdf http://mostconf.org/2014/slides/s3p2-slides.pdf |
A Systematic Security Evaluation of Android's Multi-User Framework | MOBILE SECURITY TECHNOLOGIES 2014 | 17th May 2014 | Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang and Wenliang Du | http://mostconf.org/2014/papers/s3p3.pdf http://mostconf.org/2014/slides/s3p3-slides.pptx |
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture | MOBILE SECURITY TECHNOLOGIES 2014 | 17th May 2014 | Xinyang Ge, Hayawardh Vijayakumar and Trent Jaeger | http://mostconf.org/2014/papers/s2p3.pdf http://mostconf.org/2014/slides/s2p3-slides.pdf |
State of the Art - Exploring the New Android KitKat Runtime | HiTB Amsterdam 2014 | 29th-30th May 2014 | Paul Sabanal | http://haxpo.nl/wp-content/uploads/2014/02/D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf |
Evading Android Runtime Analysis via Sandbox Detection | AsiaCCS 2014 | 04th-06th June 2014 | Timothy Vidas, Nicolas Christin | https://www.andrew.cmu.edu/user/nicolasc/publications/VC-ASIACCS14.pdf |
VirtualSwindle: An Automated Attack Against In-App Billing on Android | AsiaCCS 2014 | 04th-06th June 2014 | Collin Mulliner, William Robertson, Engin Kirda | http://seclab.ccs.neu.edu/static/publications/asiaccs14virtualswindle.pdf |
DroidRay: A Security Evaluation System for Customized Android Firmwares | AsiaCCS 2014 | 04th-06th June 2014 | Min Zheng, Mingshen Sun, John C.S. Lui | http://www.cs.cuhk.hk/~cslui/PUBLICATION/ASIACCS2014DROIDRAY.pdf |
APKLancet: Tumor Payload Diagnosis and Purification for Android Applications | AsiaCCS 2014 | 04th-06th June 2014 | Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu | http://loccs.sjtu.edu.cn/typecho/usr/uploads/2014/04/1396105336.pdf |
BREAKING THROUGH THE BOTTLENECK: MOBILE MALWARE IS OUTBREAK SPREADING LIKE WILDFIRE | HackInParis 2014 | 23rd-27th June 2014 | Thomas Wang | http://sample.safe.baidu.com/exchange/tpl/thomas/hip2014/BreakBottleneck.7z |
Android Packers:Separating from the pack | area41 Security Conference 2014 | June 2014 | Ruchna Nigam | http://www.fortiguard.com/uploads/general/Area41Public.pdf |
Advanced Bootkit Techniques on Android | SyScan360 2014 | 16th-17th July 2014 | Chen Zhangqi & Shen Di | http://www.syscan360.org/slides/2014_EN_AdvancedBootkitTechniquesOnAndroid_ChenZhangqiShendi.pdf |
Click and Dragger: Denial and Deception on Android mobile | SyScan360 2014 | 16th-17th July 2014 | thegrugq | http://www.syscan360.org/slides/2014_EN_ClickAndDaggerDenialandDeceptionOnAndroidSmartphones_TheGrugq.pdf |