no code implementations • 25 Feb 2021 • Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
Mobile phones enable the collection of a wealth of private information, from unique identifiers (e. g., email addresses), to a user's location, to their text messages.
Mobile Security Cryptography and Security
no code implementations • 24 May 2019 • Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack.