Yanick

Results: 31



#Item
1Computing / Android / Computer architecture / System software / Smartphones / Social engineering / IOS / Mach / Google Play / Clickjacking / Yo / Mobile security

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:33
2

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna

Add to Reading List

Source URL: wp.internetsociety.org

Language: English - Date: 2017-09-02 18:26:15
    3

    Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella∗† , Yanick Fratantonio† , Martina Lindorfer† , Alessandro Puccetti† , Ali Zand† , Christopher Krueg

    Add to Reading List

    Source URL: www.s3.eurecom.fr

    Language: English - Date: 2017-11-07 11:46:31
      4

      Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the Ultrasound Ecosystem Abstract: Nowadays users often possess a variety of ele

      Add to Reading List

      Source URL: www.s3.eurecom.fr

      Language: English - Date: 2017-11-07 11:46:31
        5

        An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel

        Add to Reading List

        Source URL: www.s3.eurecom.fr

        Language: English - Date: 2017-11-07 11:46:31
          6

          Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau∗† , Yanick Fratantonio∗ , Antonio Bianchi∗ , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC

          Add to Reading List

          Source URL: www.s3.eurecom.fr

          Language: English - Date: 2017-11-07 11:46:31
            7

            TriggerScope: Towards Detecting Logic Bombs in Android Applications Yanick Fratantonio∗ , Antonio Bianchi∗ , William Robertson† , Engin Kirda† , Christopher Kruegel∗ , Giovanni Vigna∗ ∗ UC Santa Barbara

            Add to Reading List

            Source URL: www.s3.eurecom.fr

            Language: English - Date: 2017-11-07 11:46:31
              8

              Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Yanick Pouffary HP Distinguished Technologist, Chief Technologist – Technology Services – Mobility & Networking

              Add to Reading List

              Source URL: www.rmv6tf.org

              Language: English - Date: 2015-10-25 16:08:40
                9

                BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna {n

                Add to Reading List

                Source URL: www.s3.eurecom.fr

                Language: English - Date: 2017-11-07 11:46:31
                  10Computing / Technology / Wireless / Internet privacy / Radio-frequency identification / Bluetooth / Alphabet Inc. / Indoor positioning system / SilverPush / Cross-device tracking / Bluetooth low energy beacon / Android

                  Proceedings on Privacy Enhancing Technologies ; ):95–112 Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the

                  Add to Reading List

                  Source URL: petsymposium.org

                  Language: English - Date: 2017-10-04 16:18:51
                  UPDATE