Analyzing Android Encrypted Network Traffic to Identify User Actions

Volume: 11, Issue: 1, Pages: 114 - 125
Published: Jan 1, 2016
Abstract
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of...
Paper Details
Title
Analyzing Android Encrypted Network Traffic to Identify User Actions
Published Date
Jan 1, 2016
Volume
11
Issue
1
Pages
114 - 125
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.