|
Go up
|
— |
— |
|
|
2014-01-05 - Android Rootkits.pdf
|
284 KiB |
|
|
|
2015-12-03 - A Monte Carlo method for the spread of mobile malware.pdf
|
287 KiB |
|
|
|
2017-03-21 - Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.pdf
|
702 KiB |
|
|
|
2018-10-07 - A New Mobile Malware Classification for Audio Exploitation.pdf
|
190 KiB |
|
|
|
2020-04-07 - Infecting Android Applications The New Way.7z
|
4.6 MiB |
|
|
|
2020-08-10 - NFCGate - Opening the Door for NFC Security Research with a Smartphone-Based Toolkit.pdf
|
345 KiB |
|
|
|
2020-08-19 - Zecorder - Demonstrating screen recording capabilities on Android.zip
|
853 KiB |
|
|
|
2021-12-30 - Analysis of Mobile Malware A Systematic Review of Evolution and Infection Strategies.pdf
|
2.0 MiB |
|
|
|
2022-01-04 - Persistence without Persistence - Meet The Ultimate Persistence Bug - NoReboot.pdf
|
1.2 MiB |
|
|
|
2023-07-10 - Using WebAPK Technology for Phishing Attacks.pdf
|
600 KiB |
|
|