Detecting Overlay Attacks in Android

Saved in:
Bibliographic Details
Published in:Procedia computer science Vol. 231; pp. 137 - 144
Main Authors: Kar, Animesh, Stakhanova, Natalia, Branca, Enrico
Format: Journal Article
Language:English
Published: 2024
ISSN:1877-0509, 1877-0509
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Author Stakhanova, Natalia
Kar, Animesh
Branca, Enrico
Author_xml – sequence: 1
  givenname: Animesh
  surname: Kar
  fullname: Kar, Animesh
– sequence: 2
  givenname: Natalia
  surname: Stakhanova
  fullname: Stakhanova, Natalia
– sequence: 3
  givenname: Enrico
  surname: Branca
  fullname: Branca, Enrico
BookMark eNpNzzFPwzAQBWALFYlS-gtYMrAm3Pni2B6rAgWpUheYreRio4SSVHaE1H9PCwy85b3pSd-1mA3j4IW4RSgQsLrvi0McORUSJBUoCzTqQszRaJ2DAjv7t6_EMqUeTiFjLOq5uHvwk-epG96z3ZeP-_qYraap5o-UdUO2Gto4du2NuAz1PvnlXy_E29Pj6_o53-42L-vVNmdUVuXYKCgtSyobQk1BsdaWKsOGWLYGQtMErKw1laVAtefQSgUMBrz0ZWNpIej3l-OYUvTBHWL3WcejQ3Bnq-vdj9WdrQ6lO1npG8EaSS0
Cites_doi 10.1016/j.pmcj.2015.12.001
10.1109/COMST.2014.2386139
10.26599/TST.2018.9010047
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.procs.2023.12.185
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1877-0509
EndPage 144
ExternalDocumentID 10_1016_j_procs_2023_12_185
GroupedDBID --K
0R~
1B1
457
5VS
71M
9DU
AAEDT
AAEDW
AAIKJ
AALRI
AAQFI
AAXUO
AAYWO
AAYXX
ABMAC
ABWVN
ACGFS
ACRPL
ACVFH
ADBBV
ADCNI
ADEZE
ADNMO
ADVLN
AEUPX
AEXQZ
AFPUW
AFTJW
AGHFR
AIGII
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
CITATION
E3Z
EBS
EJD
EP3
FDB
FNPLU
HZ~
IXB
KQ8
M41
M~E
O-L
O9-
OK1
P2P
ROL
SES
SSZ
~HD
ID FETCH-LOGICAL-c1595-1b5049c234b3173f5c779368c83c2d80fbbf16998693f3aecfd250c080e2e4b93
ISSN 1877-0509
IngestDate Sat Nov 29 06:56:44 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1595-1b5049c234b3173f5c779368c83c2d80fbbf16998693f3aecfd250c080e2e4b93
OpenAccessLink https://doi.org/10.1016/j.procs.2023.12.185
PageCount 8
ParticipantIDs crossref_primary_10_1016_j_procs_2023_12_185
PublicationCentury 2000
PublicationDate 2024-00-00
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – year: 2024
  text: 2024-00-00
PublicationDecade 2020
PublicationTitle Procedia computer science
PublicationYear 2024
References Possemato (10.1016/j.procs.2023.12.185_bib0020) 2018
Felt (10.1016/j.procs.2023.12.185_bib0018) 2011
Tang (10.1016/j.procs.2023.12.185_bib0008) 2018; 23
Niemietz (10.1016/j.procs.2023.12.185_bib0016) 2012
Alepis (10.1016/j.procs.2023.12.185_bib0003) 2017
Fratantonio (10.1016/j.procs.2023.12.185_bib0002) 2017
Wu (10.1016/j.procs.2023.12.185_bib0004) 2016
Luo (10.1016/j.procs.2023.12.185_bib0009) 2012
10.1016/j.procs.2023.12.185_bib0011
Fernandes (10.1016/j.procs.2023.12.185_bib0007) 2017
10.1016/j.procs.2023.12.185_bib0010
Kar (10.1016/j.procs.2023.12.185_bib0017) 2023
10.1016/j.procs.2023.12.185_bib0015
Bianchi (10.1016/j.procs.2023.12.185_bib0001) 2015
Dass (10.1016/j.procs.2023.12.185_bib0014) 2021
Yan (10.1016/j.procs.2023.12.185_bib0006) 2019
Faruki (10.1016/j.procs.2023.12.185_bib0019) 2014; 17
Wang (10.1016/j.procs.2023.12.185_bib0005) 2022
Qiu (10.1016/j.procs.2023.12.185_bib0012) 2012
Hussain (10.1016/j.procs.2023.12.185_bib0013) 2016; 25
References_xml – start-page: 168
  year: 2019
  ident: 10.1016/j.procs.2023.12.185_bib0006
  article-title: Understanding and Detecting Overlay-based Android Malware at Market Scales
– start-page: 1041
  year: 2017
  ident: 10.1016/j.procs.2023.12.185_bib0002
  article-title: Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
– year: 2012
  ident: 10.1016/j.procs.2023.12.185_bib0012
  article-title: Tapjacking: An Untapped Threat in Android
  publication-title: Trend Micro
– year: 2012
  ident: 10.1016/j.procs.2023.12.185_bib0016
  article-title: UI Redressing Attacks on Android Devices
  publication-title: Black Hat Abu Dhabi
– year: 2023
  ident: 10.1016/j.procs.2023.12.185_bib0017
  article-title: Exploiting Android Browser
– start-page: 1120
  year: 2018
  ident: 10.1016/j.procs.2023.12.185_bib0020
  article-title: Clickshield: Are You Hiding Something? Towards Eradicating Clickjacking on Android
– start-page: 1122
  year: 2022
  ident: 10.1016/j.procs.2023.12.185_bib0005
  article-title: Implication of Animation on Android Security
– ident: 10.1016/j.procs.2023.12.185_bib0010
– ident: 10.1016/j.procs.2023.12.185_bib0011
– start-page: 3
  year: 2011
  ident: 10.1016/j.procs.2023.12.185_bib0018
  article-title: A Survey of Mobile Malware in The Wild
– start-page: 227
  year: 2012
  ident: 10.1016/j.procs.2023.12.185_bib0009
  article-title: Touchjacking Attacks on Web in Android, iOS, and Windows Phone
  publication-title: International Symposium On Foundations And Practice Of Security
– start-page: 55
  year: 2016
  ident: 10.1016/j.procs.2023.12.185_bib0004
  article-title: Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices
– start-page: 41
  year: 2017
  ident: 10.1016/j.procs.2023.12.185_bib0007
  article-title: Android UI Deception Revisited: Attacks and Defenses
  publication-title: Financial Cryptography And Data Security
– volume: 25
  start-page: 1
  year: 2016
  ident: 10.1016/j.procs.2023.12.185_bib0013
  article-title: The Rise of Keyloggers on Smartphones: A Survey and Insight into Motion-based Tap Inference Attacks
  publication-title: Pervasive And Mobile Computing
  doi: 10.1016/j.pmcj.2015.12.001
– ident: 10.1016/j.procs.2023.12.185_bib0015
– volume: 17
  start-page: 998
  year: 2014
  ident: 10.1016/j.procs.2023.12.185_bib0019
  article-title: Android Security: A Survey of Issues, Malware Penetration, and Defenses
  publication-title: IEEE Communications Surveys & Tutorials
  doi: 10.1109/COMST.2014.2386139
– start-page: 931
  year: 2015
  ident: 10.1016/j.procs.2023.12.185_bib0001
  article-title: What the App is That? Deception and Countermeasures in the Android User Interface
– volume: 23
  start-page: 586
  year: 2018
  ident: 10.1016/j.procs.2023.12.185_bib0008
  article-title: Side-Channel Attacks in a Real Scenario
  publication-title: Tsinghua Science And Technology
  doi: 10.26599/TST.2018.9010047
– start-page: 334
  year: 2017
  ident: 10.1016/j.procs.2023.12.185_bib0003
  article-title: Trapped by The UI: The Android Case
– start-page: 1695
  year: 2021
  ident: 10.1016/j.procs.2023.12.185_bib0014
  article-title: Attack Prediction using Hidden Markov Model
SSID ssj0000388917
Score 2.308335
SourceID crossref
SourceType Index Database
StartPage 137
Title Detecting Overlay Attacks in Android
Volume 231
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: M~E
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEF5q9eDFt_gmh95qwOzmsTkWHwhK9VCht9BsdrFVUqmx1Iu_3ZndTWytiD14CWUpS5MvfDP7deYbQhqSBTxkzHdjX8WunwnhppRKN8h6kL0qtLjSlvm3UbvNu934vla7KXthxs9RnvPJJH75V6hhDcDG1tkF4K42hQX4DKDDFWCH65-Av5D4vwAqAHdjFOvem62iwE56LW2gP0F_ZjinbhWAt0RXl-OAh6aNihUXmxrsVo7dIpV6DFnq02MPR6oakkYnxanDPUolmmdzINrhtLZgmpktEfIoctEbxsSJH9Yse1JL4ob_POPgYkOpZ6wd51jaCAYDjBECLdMpQ0nWM7N7Zj2xv8WqqoKwLE4bJHqTBDdJPJrAJktkmUZwTsI6zo8vwQ1tb2I9gbm6j9KFStf7zf2YqUxlKuXobJA1e1ZwWgbjTVKT-RZZL-dwOJaWt0mjgtyxkDsWcqefOxbyHfJwddk5v3bt9AtXQIoZuF4awOlNUOankOMxFYgIuDTkgjNBM36m0lR5IZyWw5gp1pNCZZDOonG8pNJPY7ZL6vkwl3vEwT5KyOwyFfLIFyzjgfT9QGW9KMa-Z7FPTss7hcepTU6SXx7wwWJfPySr-G4Z3eqI1IvRmzwmK2Jc9F9HJxqkT0GWSOk
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Overlay+Attacks+in+Android&rft.jtitle=Procedia+computer+science&rft.au=Kar%2C+Animesh&rft.au=Stakhanova%2C+Natalia&rft.au=Branca%2C+Enrico&rft.date=2024&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=231&rft.spage=137&rft.epage=144&rft_id=info:doi/10.1016%2Fj.procs.2023.12.185&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2023_12_185
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon