Detecting Overlay Attacks in Android
Saved in:
| Published in: | Procedia computer science Vol. 231; pp. 137 - 144 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
2024
|
| ISSN: | 1877-0509, 1877-0509 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Author | Stakhanova, Natalia Kar, Animesh Branca, Enrico |
|---|---|
| Author_xml | – sequence: 1 givenname: Animesh surname: Kar fullname: Kar, Animesh – sequence: 2 givenname: Natalia surname: Stakhanova fullname: Stakhanova, Natalia – sequence: 3 givenname: Enrico surname: Branca fullname: Branca, Enrico |
| BookMark | eNpNzzFPwzAQBWALFYlS-gtYMrAm3Pni2B6rAgWpUheYreRio4SSVHaE1H9PCwy85b3pSd-1mA3j4IW4RSgQsLrvi0McORUSJBUoCzTqQszRaJ2DAjv7t6_EMqUeTiFjLOq5uHvwk-epG96z3ZeP-_qYraap5o-UdUO2Gto4du2NuAz1PvnlXy_E29Pj6_o53-42L-vVNmdUVuXYKCgtSyobQk1BsdaWKsOGWLYGQtMErKw1laVAtefQSgUMBrz0ZWNpIej3l-OYUvTBHWL3WcejQ3Bnq-vdj9WdrQ6lO1npG8EaSS0 |
| Cites_doi | 10.1016/j.pmcj.2015.12.001 10.1109/COMST.2014.2386139 10.26599/TST.2018.9010047 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.procs.2023.12.185 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1877-0509 |
| EndPage | 144 |
| ExternalDocumentID | 10_1016_j_procs_2023_12_185 |
| GroupedDBID | --K 0R~ 1B1 457 5VS 71M 9DU AAEDT AAEDW AAIKJ AALRI AAQFI AAXUO AAYWO AAYXX ABMAC ABWVN ACGFS ACRPL ACVFH ADBBV ADCNI ADEZE ADNMO ADVLN AEUPX AEXQZ AFPUW AFTJW AGHFR AIGII AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ CITATION E3Z EBS EJD EP3 FDB FNPLU HZ~ IXB KQ8 M41 M~E O-L O9- OK1 P2P ROL SES SSZ ~HD |
| ID | FETCH-LOGICAL-c1595-1b5049c234b3173f5c779368c83c2d80fbbf16998693f3aecfd250c080e2e4b93 |
| ISSN | 1877-0509 |
| IngestDate | Sat Nov 29 06:56:44 EST 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c1595-1b5049c234b3173f5c779368c83c2d80fbbf16998693f3aecfd250c080e2e4b93 |
| OpenAccessLink | https://doi.org/10.1016/j.procs.2023.12.185 |
| PageCount | 8 |
| ParticipantIDs | crossref_primary_10_1016_j_procs_2023_12_185 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-00-00 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – year: 2024 text: 2024-00-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Procedia computer science |
| PublicationYear | 2024 |
| References | Possemato (10.1016/j.procs.2023.12.185_bib0020) 2018 Felt (10.1016/j.procs.2023.12.185_bib0018) 2011 Tang (10.1016/j.procs.2023.12.185_bib0008) 2018; 23 Niemietz (10.1016/j.procs.2023.12.185_bib0016) 2012 Alepis (10.1016/j.procs.2023.12.185_bib0003) 2017 Fratantonio (10.1016/j.procs.2023.12.185_bib0002) 2017 Wu (10.1016/j.procs.2023.12.185_bib0004) 2016 Luo (10.1016/j.procs.2023.12.185_bib0009) 2012 10.1016/j.procs.2023.12.185_bib0011 Fernandes (10.1016/j.procs.2023.12.185_bib0007) 2017 10.1016/j.procs.2023.12.185_bib0010 Kar (10.1016/j.procs.2023.12.185_bib0017) 2023 10.1016/j.procs.2023.12.185_bib0015 Bianchi (10.1016/j.procs.2023.12.185_bib0001) 2015 Dass (10.1016/j.procs.2023.12.185_bib0014) 2021 Yan (10.1016/j.procs.2023.12.185_bib0006) 2019 Faruki (10.1016/j.procs.2023.12.185_bib0019) 2014; 17 Wang (10.1016/j.procs.2023.12.185_bib0005) 2022 Qiu (10.1016/j.procs.2023.12.185_bib0012) 2012 Hussain (10.1016/j.procs.2023.12.185_bib0013) 2016; 25 |
| References_xml | – start-page: 168 year: 2019 ident: 10.1016/j.procs.2023.12.185_bib0006 article-title: Understanding and Detecting Overlay-based Android Malware at Market Scales – start-page: 1041 year: 2017 ident: 10.1016/j.procs.2023.12.185_bib0002 article-title: Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop – year: 2012 ident: 10.1016/j.procs.2023.12.185_bib0012 article-title: Tapjacking: An Untapped Threat in Android publication-title: Trend Micro – year: 2012 ident: 10.1016/j.procs.2023.12.185_bib0016 article-title: UI Redressing Attacks on Android Devices publication-title: Black Hat Abu Dhabi – year: 2023 ident: 10.1016/j.procs.2023.12.185_bib0017 article-title: Exploiting Android Browser – start-page: 1120 year: 2018 ident: 10.1016/j.procs.2023.12.185_bib0020 article-title: Clickshield: Are You Hiding Something? Towards Eradicating Clickjacking on Android – start-page: 1122 year: 2022 ident: 10.1016/j.procs.2023.12.185_bib0005 article-title: Implication of Animation on Android Security – ident: 10.1016/j.procs.2023.12.185_bib0010 – ident: 10.1016/j.procs.2023.12.185_bib0011 – start-page: 3 year: 2011 ident: 10.1016/j.procs.2023.12.185_bib0018 article-title: A Survey of Mobile Malware in The Wild – start-page: 227 year: 2012 ident: 10.1016/j.procs.2023.12.185_bib0009 article-title: Touchjacking Attacks on Web in Android, iOS, and Windows Phone publication-title: International Symposium On Foundations And Practice Of Security – start-page: 55 year: 2016 ident: 10.1016/j.procs.2023.12.185_bib0004 article-title: Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices – start-page: 41 year: 2017 ident: 10.1016/j.procs.2023.12.185_bib0007 article-title: Android UI Deception Revisited: Attacks and Defenses publication-title: Financial Cryptography And Data Security – volume: 25 start-page: 1 year: 2016 ident: 10.1016/j.procs.2023.12.185_bib0013 article-title: The Rise of Keyloggers on Smartphones: A Survey and Insight into Motion-based Tap Inference Attacks publication-title: Pervasive And Mobile Computing doi: 10.1016/j.pmcj.2015.12.001 – ident: 10.1016/j.procs.2023.12.185_bib0015 – volume: 17 start-page: 998 year: 2014 ident: 10.1016/j.procs.2023.12.185_bib0019 article-title: Android Security: A Survey of Issues, Malware Penetration, and Defenses publication-title: IEEE Communications Surveys & Tutorials doi: 10.1109/COMST.2014.2386139 – start-page: 931 year: 2015 ident: 10.1016/j.procs.2023.12.185_bib0001 article-title: What the App is That? Deception and Countermeasures in the Android User Interface – volume: 23 start-page: 586 year: 2018 ident: 10.1016/j.procs.2023.12.185_bib0008 article-title: Side-Channel Attacks in a Real Scenario publication-title: Tsinghua Science And Technology doi: 10.26599/TST.2018.9010047 – start-page: 334 year: 2017 ident: 10.1016/j.procs.2023.12.185_bib0003 article-title: Trapped by The UI: The Android Case – start-page: 1695 year: 2021 ident: 10.1016/j.procs.2023.12.185_bib0014 article-title: Attack Prediction using Hidden Markov Model |
| SSID | ssj0000388917 |
| Score | 2.308335 |
| SourceID | crossref |
| SourceType | Index Database |
| StartPage | 137 |
| Title | Detecting Overlay Attacks in Android |
| Volume | 231 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: M~E dateStart: 20100101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEF5q9eDFt_gmh95qwOzmsTkWHwhK9VCht9BsdrFVUqmx1Iu_3ZndTWytiD14CWUpS5MvfDP7deYbQhqSBTxkzHdjX8WunwnhppRKN8h6kL0qtLjSlvm3UbvNu934vla7KXthxs9RnvPJJH75V6hhDcDG1tkF4K42hQX4DKDDFWCH65-Av5D4vwAqAHdjFOvem62iwE56LW2gP0F_ZjinbhWAt0RXl-OAh6aNihUXmxrsVo7dIpV6DFnq02MPR6oakkYnxanDPUolmmdzINrhtLZgmpktEfIoctEbxsSJH9Yse1JL4ob_POPgYkOpZ6wd51jaCAYDjBECLdMpQ0nWM7N7Zj2xv8WqqoKwLE4bJHqTBDdJPJrAJktkmUZwTsI6zo8vwQ1tb2I9gbm6j9KFStf7zf2YqUxlKuXobJA1e1ZwWgbjTVKT-RZZL-dwOJaWt0mjgtyxkDsWcqefOxbyHfJwddk5v3bt9AtXQIoZuF4awOlNUOankOMxFYgIuDTkgjNBM36m0lR5IZyWw5gp1pNCZZDOonG8pNJPY7ZL6vkwl3vEwT5KyOwyFfLIFyzjgfT9QGW9KMa-Z7FPTss7hcepTU6SXx7wwWJfPySr-G4Z3eqI1IvRmzwmK2Jc9F9HJxqkT0GWSOk |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Overlay+Attacks+in+Android&rft.jtitle=Procedia+computer+science&rft.au=Kar%2C+Animesh&rft.au=Stakhanova%2C+Natalia&rft.au=Branca%2C+Enrico&rft.date=2024&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=231&rft.spage=137&rft.epage=144&rft_id=info:doi/10.1016%2Fj.procs.2023.12.185&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2023_12_185 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon |