All your sessions are belong to us: Investigating authenticator leakage through backup channels on Android
Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own managemen...
Saved in:
Main Authors: | BAI, Guangdong, SUN, Jun, WU, Jianliang, YE, Quanqi, LI, Li, DONG, Jin Song, GUO, Shanqing |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4950 https://ink.library.smu.edu.sg/context/sis_research/article/5953/viewcontent/ICECCS2015a.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Towards model checking android applications
by: Bai, Guangdong, et al.
Published: (2020) -
Towards model checking Android applications
by: BAI, Guangdong, et al.
Published: (2018) -
To one race, humankind we all belong
by: Ong, Jeanne, et al.
Published: (1986) -
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
Strongly leakage-resilient authenticated key exchange
by: CHEN, Rongmao, et al.
Published: (2016)