USENIX Security Symposium, USENIX Security 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

The Cut-and-Choose Game and Its Application to Cryptographic Protocols

Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat

The Cut-and-Choose Game and Its Application to Cryptographic Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verifying Constant-Time Implementations

José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Michael Emmi

Verifying Constant-Time Implementations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images

Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images

Details
Discussion Comments: 0
Verification: Authors have not verified information

One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation

Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Radu Teodorescu

One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor

Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta

überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor

Details
Discussion Comments: 0
Verification: Authors have not verified information

Website-Targeted False Content Injection by Network Operators

Gabi Nakibly, Jaime Schcolnik, Yossi Rubin

Website-Targeted False Content Injection by Network Operators

Details
Discussion Comments: 0
Verification: Authors have not verified information

APISan: Sanitizing API Usages through Semantic Cross-Checking

Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik

APISan: Sanitizing API Usages through Semantic Cross-Checking

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Post-quantum Key Exchange - A New Hope

Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe

Post-quantum Key Exchange - A New Hope

Details
Discussion Comments: 0
Verification: Authors have not verified information

Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos

Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose

Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities

Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos

On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities

Details
Author Comments: Some of the fixes proposed in our paper are in the production git codebase as of 2.9.0. [ You can find the release notes for git that mention the inclusion of some of our patches into git here: https://lwn.net/Articles/691223/ (Notice the first author's name in contributors list.) The discussion thread, etc. about the actual patch set and what it includes is here: https://public-inbox.org/git/20161007210721.20437-1-santiago@nyu.edu/ ] We are working with to integrate other techniques from the paper now. While we recommend using our changes to the production git code to do any benchmarking or comparison, we would be happy to provide a copy of our prototype code to any researchers that request it.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware

Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda

UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making USB Great Again with USBFILTER

Dave (Jing) Tian, Nolen Scaife, Adam M. Bates, Kevin R. B. Butler, Patrick Traynor

Making USB Great Again with USBFILTER

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stealing Machine Learning Models via Prediction APIs

Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart

Stealing Machine Learning Models via Prediction APIs

Details
Discussion Comments: 0
Verification: Authors have not verified information

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Off-Path TCP Exploits: Global Rate Limit Considered Dangerous

Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel

Off-Path TCP Exploits: Global Rate Limit Considered Dangerous

Details
Discussion Comments: 0
Verification: Authors have not verified information

Egalitarian Computing

Alex Biryukov, Dmitry Khovratovich

Egalitarian Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically Detecting Error Handling Bugs Using Error Specifications

Suman Jana, Yuan Jochen Kang, Samuel Roth, Baishakhi Ray

Automatically Detecting Error Handling Bugs Using Error Specifications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels

Bradley Reaves, Logan Blue, Patrick Traynor

AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

The Million-Key Question - Investigating the Origins of RSA Public Keys

Petr Svenda, Matús Nemec, Peter Sekan, Rudolf Kvasnovský, David Formánek, David Komárek, Vashek Matyás

The Million-Key Question - Investigating the Origins of RSA Public Keys

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Protecting Privacy of BLE Device Users

Kassem Fawaz, Kyu-Han Kim, Kang G. Shin

Protecting Privacy of BLE Device Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants

Karel Bartos, Michal Sofka, Vojtech Franc

Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Michael Backes, Pascal Berrang, Anna Hecksteden, Mathias Humbert, Andreas Keller, Tim Meyer

Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Measuring and Mitigating Social Engineering Software Download Attacks

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad

Towards Measuring and Mitigating Social Engineering Software Download Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Undermining Information Hiding (and What to Do about It)

Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos

Undermining Information Hiding (and What to Do about It)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying and Characterizing Sybils in the Tor Network

Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster

Identifying and Characterizing Sybils in the Tor Network

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Thoth: Comprehensive Policy Compliance in Data Retrieval Systems

Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel

Thoth: Comprehensive Policy Compliance in Data Retrieval Systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

ZKBoo: Faster Zero-Knowledge for Boolean Circuits

Irene Giacomelli, Jesper Madsen, Claudio Orlandi

ZKBoo: Faster Zero-Knowledge for Boolean Circuits

Details
Discussion Comments: 0
Verification: Authors have not verified information

k-fingerprinting: A Robust Scalable Website Fingerprinting Technique

Jamie Hayes, George Danezis

k-fingerprinting: A Robust Scalable Website Fingerprinting Technique

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems

Flavio D. Garcia, David Oswald, Timo Kasper, Pierre Pavlidès

Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks

Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Trusted Browsers for Uncertain Times

David Kohlbrenner, Hovav Shacham

Trusted Browsers for Uncertain Times

Details
Author Comments: Fuzzyfox is designed to test the feasibility of a subset of the defenses outlined in the paper. Feel free to use it in your research on timing side channels and defenses, we only ask that you be clear about the limitations of what it mitigates.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution

Peter Rindal, Mike Rosulek

Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Ariadne: A Minimal Approach to State Continuity

Raoul Strackx, Frank Piessens

Ariadne: A Minimal Approach to State Continuity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys

Mathy Vanhoef, Frank Piessens

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hidden Voice Commands

Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, Wenchao Zhou

Hidden Voice Commands

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads

Muhammad Ahmad Bashir, Sajjad Arshad, William K. Robertson, Christo Wilson

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads

Details
Discussion Comments: 0
Verification: Authors have not verified information

Defending against Malicious Peripherals with Cinch

Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish

Defending against Malicious Peripherals with Cinch

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software

Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy

Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Comprehensive Measurement Study of Domain Generating Malware

Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla

A Comprehensive Measurement Study of Domain Generating Malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Request and Conquer: Exposing Cross-Origin Resource Size

Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen

Request and Conquer: Exposing Cross-Origin Resource Size

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services

Platon Kotzias, Leyla Bilge, Juan Caballero

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

You've Got Vulnerability: Exploring Effective Vulnerability Notifications

Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson

You've Got Vulnerability: Exploring Effective Vulnerability Notifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Specification Mining for Intrusion Detection in Networked Control Systems

Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl

Specification Mining for Intrusion Detection in Networked Control Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries

Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos

An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes

Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO

Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Kehuan Zhang

The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO

Details
Discussion Comments: 0
Verification: Authors have not verified information

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016

Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

PIkit: A New Kernel-Independent Processor-Interconnect Rootkit

WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim

PIkit: A New Kernel-Independent Processor-Interconnect Rootkit

Details
Discussion Comments: 0
Verification: Authors have not verified information

What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Giorgi Maisuradze, Michael Backes, Christian Rossow

What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Details
Discussion Comments: 0
Verification: Authors have not verified information

Authenticated Network Time Synchronization

Benjamin Dowling, Douglas Stebila, Greg Zaverucha

Authenticated Network Time Synchronization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flip Feng Shui: Hammering a Needle in the Software Stack

Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos

Flip Feng Shui: Hammering a Needle in the Software Stack

Details
Author Comments: The two exploits developed as part of this paper are withheld in order to protect the affected parties. The video demos of the exploits can be found here: https://www.vusec.net/projects/flip-feng-shui
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

ARMageddon: Cache Attacks on Mobile Devices

Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard

ARMageddon: Cache Attacks on Mobile Devices

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Practical DIFC Enforcement on Android

Adwait Nadkarni, Benjamin Andow, William Enck, Somesh Jha

Practical DIFC Enforcement on Android

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DROWN: Breaking TLS Using SSLv2

Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt

DROWN: Breaking TLS Using SSLv2

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System

Yaoqi Jia, Tarik Moataz, Shruti Tople, Prateek Saxena

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System

Details
Discussion Comments: 0
Verification: Authors have not verified information

fTPM: A Software-Only Implementation of a TPM Chip

Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Löser, Dennis Mattoon, Magnus Nyström, David Robinson, Rob Spiger, Stefan Thom, David Wooten

fTPM: A Software-Only Implementation of a TPM Chip

Details
Discussion Comments: 0
Verification: Authors have not verified information

Poking Holes in Information Hiding

Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida

Poking Holes in Information Hiding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure, Precise, and Fast Floating-Point Operations on x86 Processors

Ashay Rane, Calvin Lin, Mohit Tiwari

Secure, Precise, and Fast Floating-Point Operations on x86 Processors

Details
Discussion Comments: 0
Verification: Authors have not verified information

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks

Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sanctum: Minimal Hardware Extensions for Strong Software Isolation

Victor Costan, Ilia A. Lebedev, Srinivas Devadas

Sanctum: Minimal Hardware Extensions for Strong Software Isolation

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Fingerprinting Electronic Control Units for Vehicle Intrusion Detection

Kyong-Tak Cho, Kang G. Shin

Fingerprinting Electronic Control Units for Vehicle Intrusion Detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption

Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Empirical Study of Textual Key-Fingerprint Representations

Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith

An Empirical Study of Textual Key-Fingerprint Representations

Details
Discussion Comments: 0
Verification: Authors have not verified information

You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors

Neil Zhenqiang Gong, Bin Liu

You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks

William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, Bryan Ford

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage

Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, Michael Rushanan

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Oblivious Multi-Party Machine Learning on Trusted Processors

Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa

Oblivious Multi-Party Machine Learning on Trusted Processors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud

Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, Ghassan O. Karame

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

zxcvbn: Low-Budget Password Strength Estimation

Daniel Lowe Wheeler

zxcvbn: Low-Budget Password Strength Estimation

Details
Discussion Comments: 0
Verification: Author has not verified information

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis

Yousra Aafer, Xiao Zhang, Wenliang Du

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information