Riccardo Spolaor, Ph.D.
Home
Projects
Talks
Publications
Teaching
Contact
User actions
Analyzing Android Encrypted Network Traffic to Identify User Actions
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the …
Cite
×