-
2018-12-01 | A Large Scale Investigation of Obfuscation Use in Google Play
-
2018-12-01 | Characterizing the Security of the SMS Ecosystem with Public Gateways
-
2018-05-01 | Sonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance Bounding
-
2017-08-01 | AuthentiCall: Efficient identity and content authentication for phone calls
-
2017-08-01 | Regulators, Mount Up? Analysis of Privacy Policies for Mobile Money Applications
-
2017-01-01 | FinTechSec: Addressing the Security Challenges of Digital Financial Services
-
2017-01-01 | Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
-
2017-01-01 | Phonion: Practical protection of metadata in telephony networks
-
2016-10-01 | *droid: Assessment and evaluation of Android application analysis tools
-
2016-08-01 | Authloop: Practical end-to-end cryptographic authentication for telephony over voice channels
-
2016-07-01 | Detecting SMS spam in the age of legitimate bulk messaging
-
2016-05-01 | Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
-
2015-08-01 | Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
-
2015-08-01 | Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
-
2015-01-01 | Uncovering Use-After-Free Conditions In Compiled Code
-
2013-04-01 | MAST: Triage for Market-scale Mobile Malware Analysis
-
2013-02-01 | The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers