Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243785
|View full text |Cite
|
Sign up to set email alerts
|

ClickShield

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Along with the overlay based attacks, there is also a large body of work proposing defense solutions. Possemato et al [61] surveyed 60 apps to understand how realworld apps use overlays. The derived insights (e.g., overlays at the margins are typically not problematic) can be utilized to detect suspicious overlaps potentially exploited for clickjacking purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Along with the overlay based attacks, there is also a large body of work proposing defense solutions. Possemato et al [61] surveyed 60 apps to understand how realworld apps use overlays. The derived insights (e.g., overlays at the margins are typically not problematic) can be utilized to detect suspicious overlaps potentially exploited for clickjacking purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Using static analysis for detecting authentication. Static analysis techniques have been extensively used in previous work, for instance for detecting malicious application logic on Android or Web application [9,15,22], and for detecting privacy leaks in both iOS [14] and Android [16] apps. Closely related to ours is the work of Shao et al, which studies the presence of authentication in the use of Unix domain sockets on Android [25].…”
Section: Related Workmentioning
confidence: 99%