Blog
- Home /
- Blog
Droydseuss: Android Malware Tracking and Intelligence
We wanted to create a malware tracker similar to ZeusTracker, but for mobile bankers. So we built a tool, DroydSeuss, which uses static analysis to extract relevant C&C endpoints (e.g., phone number, web URLs) and monitors them by running each sample in a sandbox on a daily basis.
Read MoreGrab 'n Run: Secure dynamic code loading for Android
A simple and effective Java Library that you can easily add to your Android projects to perform secure dynamic class loading operations.
Read MoreInternet of Things. Applicazioni, sicurezza e riservatezza dei dati personali
Sono stato invitato dal Garante per la Protezione dei Dati alla giornata europea della privacy, con richiesta di fare un po’ di chiarezza sul fenomeno IoT. Questo articolo รจ una versione “verbosa” del mio intervento, che si incentra sui tre fattori che, secondo me, hanno contribuito a dar vita a questo fenomeno: tecnologia accessibile a basso costo, moltitudine di scenari applicativi e media.
Read MoreAndRadar: Mobile app Marketplace Monitoring and Reputation Analysis
The main goal of this project is to provide a dashboard to analyze and monitor the spreading of Android malware in marketplaces. AndRadar uses lightweight fingerprints to lookup malware samples without the need to download them from the markets.
Read MoreiSnoop: Automatic Eavesdropping from Touchscreen Keyboards
Spying on a person is an easy and effective method to obtain sensitive information, even when the victim is well protected against common digital attacks. Modern mobile devices allow people to perform some information sensitive actions in unsafe places, where anyone could easily observe the victim while typing.
Read MoreCategories
- Anomaly Detection ( 1 )
- Arduino ( 1 )
- Automotive ( 1 )
- Communication ( 3 )
- Computer Vision ( 1 )
- Content Curation ( 1 )
- CVE ( 1 )
- Defacement ( 1 )
- Embedded ( 3 )
- Firmware ( 1 )
- Fraud ( 1 )
- Hardware ( 1 )
- Industrial ( 2 )
- Internet of Things ( 1 )
- Machine Learning ( 1 )
- Maker ( 1 )
- Malware ( 6 )
- Measurement ( 1 )
- Mobile ( 5 )
- Operational Technology Security ( 1 )
- Platform ( 1 )
- Psychology ( 2 )
- Ransomware ( 1 )
- Reverse Engineering ( 2 )
- RF ( 2 )
- Robotics ( 1 )
- Security ( 10 )
- Silicon ( 1 )
- STEAM ( 1 )
Tags
- Android
- Arduino
- Black Hat
- Boot
- Cars
- Chipsec
- Covid
- DCL
- Defacement
- DIMVA
- DNS
- Eletronics
- Embedded
- Espionage
- Firmware
- Fuzzing
- IIoT
- Industrial
- Intel
- Iot
- Italian
- Italy
- Lenovo
- Malware
- Measurement
- Mobile
- Motivation
- Paper
- POLIMI
- Privacy
- Psychology
- Radio
- Ransomware
- Reading
- RF
- Routers
- SDR
- Security
- STEAM
- Trend Micro
- Trendmicro
- Vulnerability
- Web
- Webinject
- Workshop
- Youth