Tag: igor muttik

  • VB2016 paper: Wild Android collusions

    Playing out in the sidelines of the Cambridge Analytica scandal was the discovery that Facebook had been collecting metadata on the calls and SMS conversations of many of the users of its Android app. Whatever your view on this practice, the fact that it is carried out by a single app does at least make…

  • VB2016 paper: Wild Android collusions

    Playing out in the sidelines of the Cambridge Analytica scandal was the discovery that Facebook had been collecting metadata on the calls and SMS conversations of many of the users of its Android app. Whatever your view on this practice, the fact that it is carried out by a single app does at least make…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…

  • VB2015 paper: Economic Sanctions on Malware

    Financial pressure can be a proactive and potentially very effective tool in making our computer ecosystems safer: making attackers spend real money before they can deploy malware is an effective deterrent. In his VB2015 paper, Igor Muttik analyses and gives examples of technologies (certificates, credentials, etc.) that can be used to de-incentivize bad behaviours in…

  • VB2015 paper: Economic Sanctions on Malware

    Financial pressure can be a proactive and potentially very effective tool in making our computer ecosystems safer: making attackers spend real money before they can deploy malware is an effective deterrent. In his VB2015 paper, Igor Muttik analyses and gives examples of technologies (certificates, credentials, etc.) that can be used to de-incentivize bad behaviours in…