From the Aether to the Ethernet – Attacking the Internet using Broadcast Digital Television

From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television - Oren & Koremytis 2014 Before reading any further, please ensure you are in a carpeted area or other soft ground. Your jaw may hit the floor a few times when you hear what Oren & Koremytis have to tell us, … Continue reading From the Aether to the Ethernet – Attacking the Internet using Broadcast Digital Television

Information-Flow Analysis of Android Applications in DroidSafe

Information-Flow Analysis of Android Applications in DroidSafe - Gordon et al. 2015 This is the first of three papers we'll be looking at this week from the NDSS'15 conference that took place earlier this month. DroidSafe is a tool that looks for potential leaks of sensitive information in Android applications. And it works incredibly well! … Continue reading Information-Flow Analysis of Android Applications in DroidSafe