A case for lease-based, utilitarian resource management on mobile devices

A case for lease-based, utilitarian resource management on mobile devices Hu et al., ASPLOS'19 I’ve chosen another energy-related paper to end the week, addressing a problem many people can relate to: apps that drain your battery. LeaseOS borrows the concept of a lease from distributed systems, but with a rather nice twist, and is able … Continue reading A case for lease-based, utilitarian resource management on mobile devices

Google workloads for consumer devices: mitigating data movement bottlenecks

Google workloads for consumer devices: mitigating data movement bottlenecks Boroumand et al., ASPLOS'18 What if your mobile device could be twice as fast on common tasks, greatly improving the user experience, while at the same time significantly extending your battery life? This is the feat that the authors of today’s paper pull-off, using a technique … Continue reading Google workloads for consumer devices: mitigating data movement bottlenecks

Bug fixes, improvements, … and privacy leaks

Bug fixes, improvements, ... and privacy leaks. A longitudinal study of PII leaks across Android app versions  Ren et al., NDSS’18 It’s another cut of similar data today, but this time looking at how privacy information is leaked over time in different versions of an (Android mobile) app. You probably don’t need to read the … Continue reading Bug fixes, improvements, … and privacy leaks

Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem

Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem Razaghpanah et al., NDSS’18 Sadly you probably won’t be surprised to learn that this study reveals user tracking is widespread within the mobile app (Android) ecosystem. The focus is on third-party services included in apps, identified by the network domains they try … Continue reading Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem

Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers

Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers Luo et al., CCS’17 Towards the end of last year, browsing on mobile devices overtook browsing on the desktop. And so when we think about mobile security, in addition to thinking about malicious applications, we also need to start thinking much more seriously about mobile … Continue reading Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers

Cloak and dagger: from two permissions to complete control of the UI feedback loop

Cloak and dagger: from two permissions to complete control of the UI feedback loop Fratantonio et al., IEEE Security and Privacy 2017 If you're using Android, then 'cloak and dagger' is going to make for scary reading. It's a perfect storm of an almost undetectable attack that can capture passwords, pins, and ultimately obtain all … Continue reading Cloak and dagger: from two permissions to complete control of the UI feedback loop

Apps with hardware: enabling run-time architectural customization in smart phones

Apps with hardware: enabling run-time architectural customization in smart phones Coughlin et al., USENIX ATC'16 This week we've had a couple of hardware-related papers, and one touching on mobile apps (in the context of DNNs). Today's choice brings those themes together with some really creative thinking - programmable hardware for smartphones! With thanks to Afshaan … Continue reading Apps with hardware: enabling run-time architectural customization in smart phones