Mobile Security

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks

detect and understand how mobile devices are recruited to serve as web proxies

Understanding iOS-based Crowdturfing Through Hidden UI Analysis

Detect and measure hidden crowdturfing UIs in IOS apps.

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Understand and mitigate synchronized token lifting and spending in mobile payment.