Title |
Speakers |
Summary |
Topic Types |
Keynote: Security and Privacy Challenges in Mobile Augmented Reality |
David Molnar
|
Augmented reality (AR) takes natural user input (NUI), such as gestures, voice, and eye gaze, ... |
Security
|
Location and Permission |
Ahmad-reza Sadeghi
|
N/A |
Security
|
An Empirical Study of Location Truncation on Android |
Jeffrey S. Foster
,
Kristopher Micinski
,
Philip Phelps
|
N/A |
|
Quantifying the Effects of Removing Permissions from Android Applications |
Hao Chen
,
Kristen Kennedy
,
Eric Gustafson
|
N/A |
|
Longitudinal Analysis of Android Ad Library Permissions |
Adam Pridgen
,
Dan S. Wallach
,
Theodore Book
|
N/A |
|
Short Paper: Nomadic Honeypots: A Novel Concept for Smartphone Honeypots |
Collin Mulliner
,
Matthias Lange
,
Steffen Liebergeld
|
N/A |
IncludeThinkstScapes
Defence
Mobile Security
Honeypot
|
Authentication |
Clinton Gibler
|
N/A |
Security
|
GuarDroid: A Trusted Path for Password Entry |
David Evans
,
Tianhao Tong
|
N/A |
|
gridWordX: Design, Implementation, and Usability Evaluation of an Authentication Scheme Supporting Both Desktops and Mobile Devices |
Ugur Cil
,
Kemal Bicakci
|
N/A |
|
Zerosquare: A Privacy-Friendly Location Hub for Geosocial Applications |
Urs Hengartner
,
Sarah Pidcock
|
N/A |
|
Short Paper: Low-Overhead User Data Protection for Smartphones using Plaintext Cache |
Jung-sang Ahn
,
Seungryoul Maeng
|
N/A |
|
Privacy and Attacks |
Larry Koved
|
N/A |
Security
|
Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices |
Lanier Watkins
,
Cherita Corbett
,
Benjamin Salazar
,
Kevin Fairbanks
,
William h. Robinson
|
N/A |
|