50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system
The Morning Paper
SEPTEMBER 24, 2019
USENIX Security Symposium 2019. Each app was then executed on a physical mobile phone equipped with a custom OS and network monitor. Network traffic is also monitored, included all TLS-secured traffic where the developers hadn’t used certificate pinning (i.e., most apps). most apps).
Let's personalize your content