Index of /Android Security Symposium/2015/


../
An infestation of dragons  Exploring vulnerabil..> 29-Jul-2020 08:22           171138594
Android and trusted execution environments (by ..> 29-Jul-2020 08:23           103903199
Android security architecture (by Nikolay Elenk..> 29-Jul-2020 08:23           145035443
Assessing Android applications using command-li..> 29-Jul-2020 08:23           125529251
Continuous risk-aware multi-modal authenticatio..> 29-Jul-2020 08:23            66246263
Exploit mitigation at the native level for RISC..> 29-Jul-2020 08:22           167740037
How Google killed two-factor authentication (by..> 29-Jul-2020 08:22            55710778
Human factors in anonymous mobile communication..> 29-Jul-2020 08:22            51192641
Improving mobile security with forensics, app a..> 29-Jul-2020 08:22           187934637
Lessons from the trenches  An inside look at An..> 29-Jul-2020 08:22           189043248
Mobile threats incident handling (by Yonas Legu..> 29-Jul-2020 08:22           123742485
Secure copy protection for mobile apps (by Nils..> 29-Jul-2020 08:23            67336036
Secure elements for you and me  A model for pro..> 29-Jul-2020 08:23           108570350
The quest for usable security (by N. Asokan).mp4   29-Jul-2020 08:22           155221722