neutral-posture 发表于 2025-3-26 22:30:02
http://reply.papertrans.cn/87/8636/863504/863504_31.pngCURL 发表于 2025-3-27 02:05:02
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps overly restrictive, as they block all suspicious apps, malicious or not, from receiving messages. As a solution, we present a communication model that allows untrusted-but-not-malicious apps to receive messages. Our model—.idden .ransmission and .olymorphic .elivery (.)—transmits sensitive messages朋党派系 发表于 2025-3-27 08:24:53
http://reply.papertrans.cn/87/8636/863504/863504_33.pngCHAR 发表于 2025-3-27 12:52:57
1867-8211 ired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. .978-3-030-90021-2978-3-030-90022-9Series ISSN 1867-8211 Series E-ISSN 1867-822X暗语 发表于 2025-3-27 15:17:56
Conference proceedings 2021ommunication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually.. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobi迅速飞过 发表于 2025-3-27 18:18:10
http://reply.papertrans.cn/87/8636/863504/863504_36.pngFLOAT 发表于 2025-3-28 00:27:23
http://reply.papertrans.cn/87/8636/863504/863504_37.pngNomadic 发表于 2025-3-28 02:16:59
Horus: A Security Assessment Framework for Android Crypto Walletste key confidentiality). We reveal several severe vulnerabilities, including, for example, storing plaintext key revealing information in 111 apps which can lead to losing wallet ownership, and storing past transaction information in 11 apps which may lead to user deanonymization.杀菌剂 发表于 2025-3-28 08:25:04
http://reply.papertrans.cn/87/8636/863504/863504_39.pngPATRI 发表于 2025-3-28 11:28:32
Smartphone Location Spoofing Attack in Wireless Networkstrate that the WiFi based localization and navigation are vulnerable to external signal attacks by testing this attack on Android smartphone. Finally, we discuss the possible defense solutions and the future work. Our study indicates the smartphone is vulnerable to external signal attacks and there is an urgent need for defense solutions.