Original paper
Analyzing Android Encrypted Network Traffic to Identify User Actions
Volume: 11, Issue: 1, Pages: 114 - 125
Published: Jan 1, 2016
Abstract
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of...
Paper Details
Title
Analyzing Android Encrypted Network Traffic to Identify User Actions
Published Date
Jan 1, 2016
Volume
11
Issue
1
Pages
114 - 125
Citation AnalysisPro
You’ll need to upgrade your plan to Pro
Looking to understand the true influence of a researcher’s work across journals & affiliations?
- Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
- Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.
Notes
History