50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system
The Morning Paper
SEPTEMBER 24, 2019
Each app was then executed on a physical mobile phone equipped with a custom OS and network monitor. Network traffic is also monitored, included all TLS-secured traffic where the developers hadn’t used certificate pinning (i.e., The destination endpoint for the network traffic typically identifies the SDK responsible.
Let's personalize your content