Skip to main content
USENIX
Conferences
Students
Sign in
Home
Attend
Registration Information
Registration Discounts
Venue, Hotel, and Travel
Students and Grants
Co-located Workshops
Program
Workshop Program
Sponsorship
Participate
Instructions for Authors and Speakers
Call for Papers
About
Workshop Organizers
Questions
Services
Past Workshops
Home
Attend
Program
Sponsorship
Participate
About
help promote
connect with us
Twitter
Facebook
LinkedIn
Google+
YouTube
twitter
Tweets by @usenix
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
»
Mobile Threats, Part II (The Revenge)
Tweet
connect with us
Mobile Threats, Part II (The Revenge)
Presentations:
How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures
connect with us