CS 858 Reading List

Disclaimers:

Examining Permissions

Detecting Privacy Leaks

Managing Privacy Leaks I

Managing Privacy Leaks II

Studying Users and Permissions

Crowdsourcing Permission Expectations

Privilege Escalation

Advertising

Control-flow Attacks

Side-channel and Covert-channel Attacks

Device Theft

New Architectures I

New Architectures II

Studying Users

Authentication

Privacy-preserving Data Processing

SSL / Cryptography

Location Sharing


Last updated: 2013-11-09 13:53:18 -0500 [validate xhtml]