Proceedings 2021 Network and Distributed System Security Symposium 2021
DOI: 10.14722/ndss.2021.24479
|View full text |Cite
|
Sign up to set email alerts
|

Preventing and Detecting State Inference Attacks on Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…This flag could prevent other apps from creating overlays on top of it. In countering UI inference, Possemato et al [62] successfully pinpointed 18 vulnerable Android APIs that may disclose state-related information, thereby mitigating the impact of dependent overlay attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This flag could prevent other apps from creating overlays on top of it. In countering UI inference, Possemato et al [62] successfully pinpointed 18 vulnerable Android APIs that may disclose state-related information, thereby mitigating the impact of dependent overlay attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers showed that real-world malware [30], [35], [54] employ state inference as the first stage in their attacks, either for phishing or to monitor and profile the user. Several research works have studied and documented techniques to reliably determine when an Android app is being executed [6], [11], [14], [16], [38], [40], [46], [47]. Possemato et al [38] grouped all existing vulnerabilities into two macro-categories: I) File system layer.…”
Section: Related Workmentioning
confidence: 99%
“…Several research works have studied and documented techniques to reliably determine when an Android app is being executed [6], [11], [14], [16], [38], [40], [46], [47]. Possemato et al [38] grouped all existing vulnerabilities into two macro-categories: I) File system layer. The proc file system (i.e., procfs) is a pseudo-file system that provides an interface to kernel data structures.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The HTTPS Everywhere initiative has surfaced as an exemplar of industry best practices in the contemporary landscape, where web security is essential. This initiative revolves around the universal adoption of HTTPS-the secure web protocol enabled by TLS/SSL-across entire websites rather than selective use (Possemato and Fratantonio, 2020). Every webpage becomes fortified with TLS/ SSL encryption, safeguarding users from online threats and ensuring no browser flags their browsing experience as unsafe.…”
mentioning
confidence: 99%