Unitevi a noi al Binding Hook Live il 27 ottobre all'Underbelly Boulevard Soho di Londra.
Unitevi a noi al Binding Hook Live

Sicurezza mobile

This module explores mobile security, focusing on the protection of mobile devices and the data they contain. It covers threats unique to mobile platforms, security practices for apps and data, and strategies for securing mobile communications and transactions.

Portale > Sicurezza informatica > Sicurezza mobile

Costruttore di programmi di studio

Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi

Pan, Xiaorui, Xueqiang Wang, Yue Duan, XiaoFeng Wang, and Heng Yin. “Dark Hazard: Learning-Based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.” In Proceedings 2017 Network and Distributed System Security Symposium. San Diego, CA: Internet Society, 2017.

https://doi.org/10.14722/ndss.2017.23265

Liu, Bin, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. “Follow My Recommendations: A Personalized Assistant for Mobile App Permissions.” In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 199–212. SOUPS ’16. Denver, CO: USENIX Association, 2016.

https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu

Lin, Jialiu, Bin Liu, Norman Sadeh, and Jason I. Hong. “Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.” In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, 199–212. SOUPS ’14. USA: USENIX Association, 2014.

Mutchler, Patrick, Adam Doup, John Mitchell, Chris Kruegel, and Giovanni Vigna. “A Large-Scale Study of Mobile Web App Security,” 2015.

Doherty, Jim. Wireless and Mobile Device Security. 2nd ed. ISSA. Burlington, Massachusetts: Jones & Bartlett Learning, 2022.

Bommisetty, Satish, Heather Mahalik, Oleg Skulkin, Rohit Tamma, and Igor Mikhaylov. Practical Mobile Forensics: A Hands-on Guide to Mastering Mobile Forensics for the IOS, Android, and the Windows Phone Platforms. 3rd ed. Birmingham: Packt Publishing, 2018.

Dwivedi, Himanshu, Chris Clark, and David Thiel. Mobile Application Security. New York: McGraw-Hill, 2010.

Boudriga, Noureddine. Security of Mobile Communications. Auerbach Publications, 2009.

Grazie per esserti iscritto alla nostra newsletter!

Thank you! RSVP received for Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

Grazie per aver fatto domanda! Ci metteremo in contatto con voi.

Apply for: Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

Caricamento...

Caricamento...