|
Up
|
|
|
|
|
2014-01-05 - Android Rootkits.pdf
|
|
|
|
|
2015-12-03 - A Monte Carlo method for the spread of mobile malware.pdf
|
|
|
|
|
2017-03-21 - Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.pdf
|
|
|
|
|
2018-10-07 - A New Mobile Malware Classification for Audio Exploitation.pdf
|
|
|
|
|
2020-04-07 - Infecting Android Applications The New Way.7z
|
|
|
|
|
2020-08-10 - NFCGate - Opening the Door for NFC Security Research with a Smartphone-Based Toolkit.pdf
|
|
|
|
|
2020-08-19 - Zecorder - Demonstrating screen recording capabilities on Android.zip
|
|
|
|
|
2021-12-30 - Analysis of Mobile Malware A Systematic Review of Evolution and Infection Strategies.pdf
|
|
|
|
|
2022-01-04 - Persistence without Persistence - Meet The Ultimate Persistence Bug - NoReboot.pdf
|
|
|
|
|
2023-07-10 - Using WebAPK Technology for Phishing Attacks.pdf
|
|
|
|