Back to Results
First PageMeta Content
Computing / IOS / Desktop Window Manager / Pulse / Android / X Window System / Software / Smartphones / System software


This paper appeared in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, August[removed]Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks Qi Alfred Chen, Zhiyun
Add to Reading List

Document Date: 2014-09-07 21:17:56


Open Document

File Size: 512,91 KB

Share Result on Facebook

City

San Diego / /

Company

Facebook / H&R Block / WebMD / /

/

Facility

Z. Morley Mao University of Michigan / University of California / /

IndustryTerm

given device / victim device / transition tool / resource management / system software / attack energy / isolation between applications / INTERNET permission / depth-first search / individual applications / reverse engineering using memory analysis tools / defense solutions / /

MusicGroup

Memento / /

NaturalFeature

Shared-Memory Side Channel / Amazon / /

OperatingSystem

Mac OS X / Windows 7 / Linux / Android / Microsoft Windows / /

Organization

University of Michigan / FP FN / University of California / Riverside / /

Person

Window / Quartz Compositor / Login Activity Login / Chase app / Chase Amazon / Login Activity / /

Position

Prime Minister / compositor / manager / vm and shared pm / General / manager property / transition model / manager design / Manager / and the application process / model / /

Product

Attack Design Details Activity injection / SQLite / Activity transition period starts t1 Early inference Activity injection / Activity injection / /

ProgrammingLanguage

Java / C++ / /

ProvinceOrState

Michigan / California / /

Technology

Viterbi algorithm / Linux / API / smartphone / Android / shared memory / typical Viterbi algorithm / Android system / Java / smartphones / X window system / HTTP / caching / animation / virtual memory / X server / GUI / be solved using the Viterbi algorithm / /

SocialTag