![]() Selvi, J.: Bypassing http strict transport security. ![]() In: Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, pp. Salem, A., Paulus, F.F., Pretschner, A.: Repackman: a tool for automatic repackaging of android apps. Polleit, P., Spreitzenbarth, M.: Defeating the secrets of OTP apps, pp. In: Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. Park, S., Shaik, A., Borgaonkar, R., Seifert, J.P.: White rabbit in mobile: effect of unsecured clock source in smartphones. In: 2020 International Conference on Information Security and Cryptology (ISCTURKEY), pp. Ozkan, C., Bicakci, K.: Security analysis of mobile authenticator applications. ![]() Nohl, K., Lell, J.: Badusb-on accessories that turn evil. M’Raihi, D., Machani, S., Pei, M., Rydell, J.: RFC 6238: TOTP: time-based one-time password algorithm (2011) M’Raihi, D., Rydell, J., Bajaj, S., Machani, S., Naccache, D.: RFC 6287: OCRA: oath challenge-response algorithm (2011) M’raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: RFC 4226: HOTP: an HMAC-based one-time password algorithm (2005) In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. Meng, W., Lee, W.H., Murali, S., Krishnan, S.: Charging me and i know your secrets! Towards juice filming attacks on smartphones. Meier, L.C.: On security against time traveling adversaries. Malhotra, A., Cohen, I.E., Brakke, E., Goldberg, S.: Attacking the network time protocol. Lau, B., Jang, Y., Song, C., Wang, T., Chung, P.H., Royal, P.: Mactans: injecting malware into iOS devices via malicious chargers. Krawczyk, H., Bellare, M., Canetti, R.: RFC2104: HMAC: keyed-hashing for message authentication (1997) Kraunelis, J., Chen, Y., Ling, Z., Fu, X., Zhao, W.: On malware leveraging the android accessibility framework. V., Vaudenay, S., Vuagnoux, M.: On the effectiveness of time travel to inject COVID-19 alerts. Huseynov, E.: TOTP replay attack - yubikey. Gilsenan, C., Shakir, F., Alomar, N., Egelman, S.: Security and privacy failures in popular 2FA apps. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. ĭe Oliveira Nunes, I., Jakkamsetti, S., Rattanavipanon, N., Tsudik, G.: On the toctou problem in remote attestation. Directive 2015/2366/EU of the European parliament and of the council (2015)Īonzo, S., Georgiu, G., Verderame, L., Merlo, A.: Obfuscapk: an open-source black-box obfuscation tool for android apps, vol.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |