Skip to content

Android Whitepapers

Jacob Soo edited this page Jul 24, 2014 · 64 revisions

Android Whitepapers

Title Notes Release Date Authors Links
Android Forensics Mobile Forensics World 2009 Andrew Hoog https://viaforensics.com/wpinstall/wp-content/uploads/2009/08/Android-Forensics-Andrew-Hoog-viaForensics.pdf
Exploratory Android Surgery Black Hat USA 2009 Jesse Burns http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-PAPER.pdf http://www.blackhat.com/presentations/bh-usa-09/BURNS/BHUSA09-Burns-AndroidSurgery-SLIDES.pdf
Reconstructing Dalvik applications HiTB Dubai 2010 Marc Schonefeld http://conference.hitb.org/hitbsecconf2010dxb/materials/D2%20-%20Marc%20Schonefeld%20-%20undx2.pdf
Building Android Sandcastles in Android's Sandbox Black Hat Abu Dhabi 2010 Nils http://media.blackhat.com/bh-ad-10/Nils/Black-Hat-AD-2010-android-sandcastle-slides.pdf https://media.blackhat.com/bh-ad-10/Nils/Black-Hat-AD-2010-android-sandcastle-wp.pdf
Taming Information-Stealing Smartphone Applications (on Android) Yajin Zhou, Xinwen Zhang, Xuxian Jiang & Vincent W. Freeh http://www.cs.ncsu.edu/faculty/jiang/pubs/TRUST11.pdf
Don't Root Robots BSides Detroit 2011 Jon Oberheide & Zach Lanier https://jon.oberheide.org/files/bsides11-dontrootrobots.pdf
Beating up on Android [Practical Android Attacks] Infiltrate 2011 Bas Alberts & Massimiliano Oldani http://www.infiltratecon.net/infiltrate/archives/Android_Attacks.pdf
This is REALLY not the Droid you’re looking for… Defcon 2011 Nicholas J. Percoco & Sean Schulte https://www.defcon.org/images/defcon-19/dc-19-presentations/Percoco-Spiderlabs/DEFCON-19-Percoco-Spiderlabs-Droid.pdf https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20presentations/Percoco-Spiderlabs/Extras/DEFCON-19-Percoco-Droid-BanthaPudu-1.0.apk https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Nicholas%20Percoco%20and%20Sean%20Schulte%20-%20This%20is%20REALLY%20not%20the%20droid%20youre%20looking%20for%20-%20Slides.m4v https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20video%20and%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Nicholas%20Percoco%20and%20Sean%20Schulte%20-%20This%20is%20REALLY%20not%20the%20droid%20youre%20looking%20for%20-%20Video%20and%20Slides.m4v
Seven Ways to Hang Yourself with Google Android Defcon 2011 Yekaterina Tsipenyuk O'Neil & Erika Chin https://www.defcon.org/images/defcon-19/dc-19-presentations/O'Neil-Chin/DEFCON-19-O'Neil-Chin-Google-Android.pdf https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Yekaterina%20Tsipenyuk%20ONeil%20and%20Erika%20Chin%20-%20Seven%20Ways%20to%20Hang%20Yourself%20with%20Google%20Android%20-%20Slides.m4v https://media.defcon.org/DEF%20CON%2019/DEF%20CON%2019%20video%20and%20slides/DEF%20CON%2019%20Hacking%20Conference%20Presentation%20By%20-%20Yekaterina%20Tsipenyuk%20ONeil%20and%20Erika%20Chin%20-%20Seven%20Ways%20to%20Hang%20Yourself%20with%20Google%20Android%20-%20Video%20and%20Slides.m4v
Security Issues in Android Custom Rom's c0c0n 2011 17 Oct 2011 Anant Shrivastava http://anantshri.info/articles/android_cust_rom_security.html
A framework for on-device privilege escalation exploit execution on Android Sebastian Höbarth & Rene Mayrhofer http://www.mobilefactory.at/wordpress/wp-content/uploads/IWSSI2011-Android-Exploit-Framework-1.pdf https://www.mayrhofer.eu.org/downloads/presentations/2011-06-16_IWSSI_Android-Exploit-Framework.pdf
Popping Shell on A(ndroid)RM Devices BlackHat DC 2011 ITZHAK AVRAHAM https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham_ARM%20Exploitation-wp.2.0.pdf https://media.blackhat.com/bh-dc-11/Avraham/BlackHat_DC_2011_Avraham-Popping_Android_Devices-Slides.pdf
Yet Another Android Rootkit Black Hat Abu Dhabi 2011 Tsukasa Oi https://media.blackhat.com/bh-ad-11/Oi/bh-ad-11-Oi-Android_Rootkit-WP.pdf https://media.blackhat.com/bh-ad-11/Oi/bh-ad-11-Oi-Android_Rootkit-Slides.pdf
How Security is Broken? : Android Internals and Malware Infection Possibility PacSec 2011 Tsukasa Oi http://pacsec.jp/psj11/PacSec2011_How-Security-is-Broken_en.pdf
Android: From Reversing to Decompilation Black Hat Abu Dhabi 2011 Anthony Desnos & Georoy Gueguen http://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_WP.pdf https://media.blackhat.com/bh-ad-11/Desnos/bh-ad-11-DesnosGueguen-Andriod-Reversing_to_Decompilation_Slides.pdf
Bypassing the Android Permission Model Hack In Paris 2011 Georgia Weidman http://hackinparis.com/slides/hip2k12/Georgia-androidpermissions.pdf
"I Know Kung-Fu!": Analyzing Mobile Malware HiTB KUL 2011 Alex Kirk http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Alex%20Kirk%20-%20Mobile%20Malware%20Analysis.pdf
Reversing Android Malware HiTB KUL 2011 Mahmud Ab Rahman http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Mahmud%20Ab%20Rahman%20-%20Reverse%20Engineering%20Android%20Malware.pdf
Exploiting Androids for Fun and Profit HiTB KUL 2011 Riley Hassell http://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Riley%20Hassell%20-%20Exploiting%20Androids%20for%20Fun%20and%20Profit.pdf
Blackbox Android HiTB KUL 2011 Marc Blanchou & Mathew Solnik http://conference.hitb.org/hitbsecconf2011kul/materials/D2T1%20-%20Marc%20Blanchou%20and%20Mathew%20Solnik%20-%20Blackbox%20Android.pdf
Popping Shell on A(ndroid)RM Devices HiTB AMS 2011 Itzhak (Zuk) Avraham http://conference.hitb.org/hitbsecconf2011ams/materials/D1T3%20-%20Itzhak%20Zuk%20Avraham%20-%20Popping%20Shell%20On%20Android%20Devices.pdf
Android - Bytecode Obfuscation bringing x86 fuckups to dalvik Patrick Schulz http://www.sec.t-labs.tu-berlin.de/spring/content/spring7_14_slides_schulz.pdf
Android Application Reverse Engineering & Defenses Patrick Schulz & Felix Matenaar http://bluebox.com/wp-content/uploads/2013/05/AndroidREnDefenses201305.pdf
Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces CODASPY 2012 Wu Zhou, Yajin Zhou, Xuxian Jiang & Peng Ning http://www.csc.ncsu.edu/faculty/jiang/pubs/CODASPY12.pdf
Dissecting Android Malware: Characterization and Evolution Oakland 2012 Yajin Zhou & Xuxian Jiang http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf
RiskRanker: Scalable and Accurate Zero-day Android Malware Detection MOBISYS 2012 Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou & Xuxian Jiang http://www.cs.ncsu.edu/faculty/jiang/pubs/MOBISYS12.pdf
Sleeping Android : Exploit through Dormant Permission Requests 28th August 2012 James Sellwood http://www.escapades-in-security.com/files/sleeping_android_release.pdf
Mobile Exploit Intelligence Project 19th April 2012 Dan Guido & Mike Arpaia http://www.trailofbits.com/resources/mobile_eip-04-19-2012.pdf https://media.blackhat.com/bh-eu-12/Guido/bh-eu-12-GuidoArpaia-Mobile_Exploit_Intelligence_Project.mp4
The Heavy Metal That Poisoned the Droid Black Hat Europe 2012 Tyrone Erasmus https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-WP.pdf https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-Slides.pdf https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy_Metal_That_Posioned_Droid.mp4
Dex Education: Practicing Safe Dex Black Hat USA 2012 26th July 2012 Tim Strazzere http://www.strazzere.com/papers/DexEducation-PracticingSafeDex.pdf
Cracking Open the Phone: An Android Malware Automated Analysis Primer RSA Conference 2012 Armando Orozco & Grayson Milbourne http://www.rsaconference.com/writable/presentations/file_upload/ht2-303.pdf
Deceiving Permissions - Rules for Android Malware Detection RSA Conference 2012 Vanja Svajcer http://www.rsaconference.com/writable/presentations/file_upload/mbs-210_svajcer.pdf
UI Redressing Attacks on Android Devices Black Hat Abu Dhabi 2012 Marcus Niemietz https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-slides.pdf https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-WP.pdf
Tackling the Android Challenge RuxconBreakpoint 2012 Joshua J. Drake http://2012.ruxconbreakpoint.com/assets/Uploads/bpx/Tackling%20the%20Android%20Challenge.pptx
Reducing the Window of Opportunity for Android Malware EICAR Conference May 2012 Axelle Apvrille & Tim Strazzere http://www.fortiguard.com/files/slidesdroid.pdf
Guns and Smoke to Defeat Mobile Malware HashDays 2012 November 2012 Axelle Apvrille http://www.fortiguard.com/files/hashdays.pdf
Mapping & Evolution of Android Permissions CounterMeasure 2012 Zach Lanier & Andrew Reiter http://www.countermeasure2012.com/presentations/LANIER_REITER.pdf
Into The Droid - Gaining Access to Android User Data Defcon 2012 Thomas Cannon https://www.defcon.org/images/defcon-20/dc-20-presentations/Cannon/DEFCON-20-Cannon-Into-The-Droid.pdf
Fast, Scalable Detection of “Piggybacked” Mobile Applications CODASPY 2013 Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang & Shihong Zou http://www.csc.ncsu.edu/faculty/jiang/pubs/CODASPY13.pdf
Playing Hide and Seek with Dalvik Executables Hacktivity 2013 Axelle Apvrille https://www.fortiguard.com/uploads/general/Hidex_Paper.pdf
Android Hax Jon Oberheide https://jon.oberheide.org/files/summercon10-androidhax-jonoberheide.pdf
Anatomy of a Remote Kernel Exploit Dan Rosenberg http://vulnfactory.org/research/h2hc-remote.pdf
PatchDroid: Scalable Third-Party Security Patches for Android Devices Collin Mulliner, Jon Oberheide, William Robertson & Engin Kirda http://www.mulliner.org/collin/academic/publications/patchdroid.pdf
Android OEM's applications (in)security and backdoors without permission Andre Moulu http://www.quarkslab.com/dl/Android-OEM-applications-insecurity-and-backdoors-without-permission.pdf
The Impact of Vendor Customizations on Android Security Computer and Communications Security 2013 Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu & Xuxian Jiang http://www.cs.ncsu.edu/faculty/jiang/pubs/CCS13.pdf
An Android Hacker's Journey: Challenges in Android Security Research CanSecWest 2013 Joshua J. Drake https://cansecwest.com/slides/2013/An%20Android%20Hacker's%20Journey-%20Challenges%20in%20Android%20Security%20Research.pptx
Nifty stuff that you can still do with Android HES 2013 2nd May 2013 Xavier 'xEU' Martin http://2013.hackitoergosum.org/presentations/Day1-05.Nifty%20stuff%20that%20you%20can%20still%20do%20with%20Android%20by%20Xavier%20Martin.pdf
Android: From Rooting to Pwning July 2013 Acexor http://hackmiami.org/wp-content/uploads/2013/07/AndroidSec.pdf
The Droid Exploitation SAGA RSA Asia-Pacific Conference 2013 ADITYA GUPTA & SUBHO HALDER https://www.rsaconference.com/writable/presentations/file_upload/mbs-t01_final_v2.pdf
How to Build a SpyPhone BlackHat USA 2013 Kevin McNamee https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-WP.pdf https://media.blackhat.com/us-13/US-13-McNamee-How-To-Build-a-SpyPhone-Slides.pdf
Lets Play Applanting BlackHat Europe 2013 Ajit Hatti https://media.blackhat.com/eu-13/briefings/Hatti/bh-eu-13-lets-play-hatti-wp.pdf https://media.blackhat.com/eu-13/briefings/Hatti/bh-eu-13-lets-play-hatti-slides.pdf
Off Grid communications with Android BlackHat Europe 2013 Josh Thomas https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-wp.pdf https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-slides.pdf
ANDROID: ONE ROOT TO OWN THEM ALL BlackHat USA 2013 Jeff Forristal https://media.blackhat.com/us-13/US-13-Forristal-Android-One-Root-to-Own-Them-All-Slides.pdf
ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS BlackHat USA 2013 Daniel Peck https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-WP.pdf https://media.blackhat.com/us-13/US-13-Peck-Abusing-Web-APIs-Through-Scripted-Android-Applications-Slides.pdf
Reversing and Auditing Android’s Proprietary Bits Recon 2013 23rd June 2013 Joshua J. Drake http://recon.cx/2013/slides/Recon2013-Joshua%20J.%20Drake-Reversing%20and%20Auditing%20Android's%20Proprietary%20Bits-public.pdf
Android games + free Wi-Fi = Privacy leak PacSec 2013 Takayuki Sugiura & Yosuke Hasegawa http://pacsec.jp/psj13/psj2013-day1_Sugiura-Hasegawa_pacsec_EJ.pptx.pdf
Defeating the protection mechanism on Android platform  PacSec 2013 Tim Xia http://pacsec.jp/psj13/psj2013-day2_Xia_Defeating_App%20protections_on_Android.pptx.pdf
Defeating Security Enhancements (SE) for Android Defcon 2013 Pau Oliva Fora https://www.defcon.org/images/defcon-21/dc-21-presentations/Fora/DEFCON-21-Fora-Defeating-SEAndroid.pdf
Playing Hide and Seek with Dalvik Executables Hack.Lu 2013 October 2013 Axelle Apvrille https://www.fortiguard.com/uploads/general/Hidex_Slides.pdf
Abusing Dalvik Beyond Recognition Hack.Lu 2013 October 2013 Jurriaan Bremer http://archive.hack.lu/2013/AbusingDalvikBeyondRecognition.pdf
Android: Game of Obfuscation H2HC 2013 Jurriaan Bremer & Rodrigo Chiossi http://androidxref.com/files/bremer_chiossi_h2hc2013.pdf
Automated Analysis and Deobfuscation of Android Apps & Malware AthCon 2013 Jurriaan Bremer http://jbremer.org/wp-posts/athcon.pdf
Android DDI: Introduction to Dynamic Dalvik Instrumentation HiTB KUL 2013 October 2013 Collin Mulliner http://www.mulliner.org/android/feed/mulliner_dbi_hitb_kul2013.pdf
TraceDroid: A Fast and Complete Android Method Tracer HiTB KUL 2013 October 2013 Victor van der Veen http://conference.hitb.org/hitbsecconf2013kul/materials/D2T2%20-%20Victor%20van%20der%20Veen%20-%20A%20Fast%20and%20Complete%20Android%20Method%20Tracer.pdf
DEX EDUCATION 201 ANTI-EMULATION HITCON 2013 19th July 2013 Tim Strazzere http://hitcon.org/2013/download/Tim%20Strazzere%20-%20DexEducation.pdf
Android Hooking Attack HITCON 2013 19th July 2013 Minpyo Hong & Dongcheol Hong http://hitcon.org/2013/download/[I2]%20Secret%20-%20AndroidHooking.pdf
Review of Security Vulnerabilities on the Android Platform HITCON 2013 19th July 2013 Claud Xiao http://hitcon.org/2013/download/[F1]%20Claud-HITCON2013-0709.pdf
Escaping Android Dynamic Analysis; Chinese New Year Train Ticket Ordering Day HITCON 2013 19th July 2013 趙閩 & 倪超 http://hitcon.org/2013/download/[G1]%20%E8%B6%99%E6%95%8F%E5%80%AA%E8%B6%85,%E9%80%83%E9%9B%A2%E5%AE%89%E5%8D%93%E6%B4%9E%E5%8B%95%E6%85%8B%E6%AA%A2%E6%B8%AC,%20%E8%A8%82%E7%A5%A8%E5%8A%A9%E6%89%8B%E4%B8%80%E6%97%A5%E8%AB%87.pdf
Droid Rage - Android exploitation on steroids EkoParty 2013 Pablo Sole & Agustin Gianni http://ekoparty.org/archive/2013/charlas/Gianni_droid_rage.pdf
TaintDroid - An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones OSDI'10 William Enck, et. al http://appanalysis.org/tdroid10.pdf
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications OSDI'10 Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna https://seclab.cs.ucsb.edu/media/uploads/papers/2014_ndss_android-remote-code-execution.pdf
Woodpecker - Systematic Detection of Capability Leaks in Stock Android Smartphones NCSU Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang http://www.csc.ncsu.edu/faculty/jiang/pubs/NDSS12_WOODPECKER.pdf
Android Security Vulnerabilities and Exploits XDA Devcon 2013 Justin Case http://forum.xda-developers.com/attachment.php?attachmentid=2182689&d=1376275794 http://www.youtube.com/watch?v=NUGwVUU61Vg
Structural Detection of Android Malware using Embedded Call Graphs AiSec 2013 Hugo Gascon, Fabian Yamaguchi, Daniel Arp & Konrad Rieck http://filepool.informatik.uni-goettingen.de/publication/sec//2013b-aisec.pdf
Android Anti-forensics: Modifying CyanogenMod HICSS 2014 Jan 2014 Karl-Johan Karlsson, William Bradley Glisson http://www.computer.org/csdl/proceedings/hicss/2014/2504/00/2504e828.pdf
Mobile Analysis Kung Fu, Santoku Style RSA Conference 2014 Andrew Hoog & Sebastián Guerrero http://www.rsaconference.com/writable/presentations/file_upload/anf-w03-mobile-analysis-kung-fu-santoku-style_v2.pdf
Beginners Guide to Reverse Engineering Android Apps RSA Conference 2014 Pau Oliva Fora http://www.rsaconference.com/writable/presentations/file_upload/stu-w02b-beginners-guide-to-reverse-engineering-android-apps.pdf
Reverse Engineering, Pentesting and Hardening of Android Apps DroidCon 2014 Marco Grassi https://speakerd.s3.amazonaws.com/presentations/25bc54e0728001318b20063debaef239/DroidconIT2014.pdf
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket NDSS 2014 23rd-26th Feb 2014 Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon & Konrad Rieck http://filepool.informatik.uni-goettingen.de/publication/sec//2014-ndss.pdf
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications NDSS 2014 23rd-26th Feb 2014 Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna https://anonymous-proxy-servers.net/paper/android-remote-code-execution.pdf
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications NDSS 2014 23rd-26th Feb 2014 Mu Zhang, Heng Yin http://sycurelab.ecs.syr.edu/~mu/AppSealer-ndss14.pdf
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps NDSS 2014 23rd-26th Feb 2014 David Sounthiraraj, Justin Sahs, Zhiqiang Lin, Latifur Khan, Garrett Greenwood https://www.utdallas.edu/~zxl111930/file/NDSS14b.pdf
AirBag: Boosting Smartphone Resistance to Malware Infection NDSS 2014 23rd-26th Feb 2014 Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang http://yajin.org/papers/ndss14_airbag.pdf
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android NDSS 2014 23rd-26th Feb 2014 Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl Gunter http://sharps.org/wp-content/uploads/NAVEED-NDSS.pdf
Screenmilker: How to Milk Your Android Screen for Secrets NDSS 2014 23rd-26th Feb 2014 Chia-Chi Lin, Hongyang Li, Xiaoyong Zhou, XiaoFeng Wang http://www.ews.uiuc.edu/~hli52/paper/ndss2014-final49.pdf
PREC: Practical Root Exploit Containment for Android Devices CODASPY 2014 March 2014 Tsung-Hsuan Ho, Daniel Dean, Xiaohui Gu, William Enck http://dance.csc.ncsu.edu/papers/codespy14.pdf
Compac: Enforce Component Level Access Control in Android CODASPY 2014 March 2014 Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu and Wenliang Du http://www.cis.syr.edu/~wedu/Research/paper/compac_codaspy2014.pdf
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform CODASPY 2014 March 2014 Wu Zhou, Zhi Wang, Yajin Zhou and Xuxian Jiang http://yajin.org/papers/codaspy14_divilar.pdf
Systematic Audit of Thirty-Party Android Phones CODASPY 2014 March 2014 Michael Mitchell, Guanyu Tian and Zhi Wang http://www.cs.fsu.edu/~zwang/files/codaspy14_1.pdf
DroidBarrier: Know What is Executing on Your Android CODASPY 2014 March 2014 Hussain Almohri, Danfeng Yao and Dennis Kafura http://people.cs.vt.edu/danfeng/papers/spy008-almohri.pdf
Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware EuroSec 2014 13th April 2014 Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Sotiris Ioannidis,
Michalis Polychronakis http://www.syssec-project.eu/m/documents/eurosec14/RATVM.pdf http://users.ics.forth.gr/~elathan/papers/eurosec14.pdf
Pentesting Android Applications Confraria Segurança PT 5/2014 May 2014 Cláudio André http://www.slideshare.net/clviper/pentesting-android-applications
From Zygote to Morula: Fortifying Weakened ASLR on Android Oakland 2014 May 2014 Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee http://www.cc.gatech.edu/~blee303/paper/morula.pdf
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating Oakland 2014 May 2014 Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, XiaoFeng Wang http://www.informatics.indiana.edu/xw7/papers/privilegescalationthroughandroidupdating.pdf
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations Oakland 2014 May 2014 Xiaoyong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, Xiaofeng Wang http://www.cs.indiana.edu/~zhou/files/sp14_zhou.pdf
Post-Mortem Memory Analysis of Cold-Booted Android Devices IMF 2014 12th-14th May 2014 Christian Hilgers, Holger Macht, Tilo Muller, Michael Spreitzenbarth http://www.homac.de/publications/Post-Mortem-Memory-Analysis-of-Cold-Booted-Android-Devices.pdf http://www.homac.de/publications/Post-Mortem-Memory-Analysis-of-Cold-Booted-Android-Devices-slides.pdf
Execute this! Looking into code-loading techniques on Android Honeynet Project Workshop 2014 12th-14th May 2014 Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna http://warsaw2014.honeynet.org/slides/honeynet2014-day1-Sebastian.pdf
Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android CarolinaCon 10 2014 16th-18th May 2014 Jake Valletta http://thecobraden.com/uploads/Valletta%20-%20CarolinaCon%20X%20-%20Exploiting%20the%20Bells%20and%20Whistles.pdf
Enter Sandbox: Android Sandbox Comparison MOBILE SECURITY TECHNOLOGIES 2014 17th May 2014 Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani and Edgar Weippl http://mostconf.org/2014/papers/s3p1.pdf http://mostconf.org/2014/slides/s3p1-slides.pdf
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities MOBILE SECURITY TECHNOLOGIES 2014 17th May 2014 Vasant Tendulkar and William Enck http://mostconf.org/2014/papers/s2p1.pdf http://mostconf.org/2014/slides/s2p1-slides.pptx
Andlantis: Large-scale Android Dynamic Analysis MOBILE SECURITY TECHNOLOGIES 2014 17th May 2014 Michael Bierma, Eric Gustafson, Jeremy Erickson, David Fritz and Yung Ryn Choe http://mostconf.org/2014/papers/s3p2.pdf http://mostconf.org/2014/slides/s3p2-slides.pdf
A Systematic Security Evaluation of Android's Multi-User Framework MOBILE SECURITY TECHNOLOGIES 2014 17th May 2014 Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang and Wenliang Du http://mostconf.org/2014/papers/s3p3.pdf http://mostconf.org/2014/slides/s3p3-slides.pptx
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture MOBILE SECURITY TECHNOLOGIES 2014 17th May 2014 Xinyang Ge, Hayawardh Vijayakumar and Trent Jaeger http://mostconf.org/2014/papers/s2p3.pdf http://mostconf.org/2014/slides/s2p3-slides.pdf
State of the Art - Exploring the New Android KitKat Runtime HiTB Amsterdam 2014 29th-30th May 2014 Paul Sabanal http://haxpo.nl/wp-content/uploads/2014/02/D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf
Evading Android Runtime Analysis via Sandbox Detection AsiaCCS 2014 04th-06th June 2014 Timothy Vidas, Nicolas Christin https://www.andrew.cmu.edu/user/nicolasc/publications/VC-ASIACCS14.pdf
VirtualSwindle: An Automated Attack Against In-App Billing on Android AsiaCCS 2014 04th-06th June 2014 Collin Mulliner, William Robertson, Engin Kirda http://seclab.ccs.neu.edu/static/publications/asiaccs14virtualswindle.pdf
DroidRay: A Security Evaluation System for Customized Android Firmwares AsiaCCS 2014 04th-06th June 2014 Min Zheng, Mingshen Sun, John C.S. Lui http://www.cs.cuhk.hk/~cslui/PUBLICATION/ASIACCS2014DROIDRAY.pdf
APKLancet: Tumor Payload Diagnosis and Purification for Android Applications AsiaCCS 2014 04th-06th June 2014 Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu http://loccs.sjtu.edu.cn/typecho/usr/uploads/2014/04/1396105336.pdf
BREAKING THROUGH THE BOTTLENECK: MOBILE MALWARE IS OUTBREAK SPREADING LIKE WILDFIRE HackInParis 2014 23rd-27th June 2014 Thomas Wang http://sample.safe.baidu.com/exchange/tpl/thomas/hip2014/BreakBottleneck.7z
Android Packers:Separating from the pack area41 Security Conference 2014 June 2014 Ruchna Nigam http://www.fortiguard.com/uploads/general/Area41Public.pdf
Advanced Bootkit Techniques on Android SyScan360 2014 16th-17th July 2014 Chen Zhangqi & Shen Di http://www.syscan360.org/slides/2014_EN_AdvancedBootkitTechniquesOnAndroid_ChenZhangqiShendi.pdf
Click and Dragger: Denial and Deception on Android mobile SyScan360 2014 16th-17th July 2014 thegrugq http://www.syscan360.org/slides/2014_EN_ClickAndDaggerDenialandDeceptionOnAndroidSmartphones_TheGrugq.pdf
Clone this wiki locally