REFERENCES
Android Developers Blog (2016). Android Developers Blog:
Changes to Trusted Certificate Authorities in Android
Nougat.
Android Open Source Project (2018a). Protecting against
Security Threats with SafetyNet.
Android Open Source Project (2018b). Verifying Hardware-
backed Key Pairs with Key Attestation.
Bente, I., Dreo, G., Hellmann, B., Heuser, S., Vieweg, J.,
von Helden, J., and Westhuis, J. (2011). Towards
Permission-Based Attestation for the Android Platform.
In Lecture Notes in Computer Science, volume 6740
LNCS, pages 108–115.
Desnos, A. and Gueguen, G. (2011). Android: From Rever-
sing to Decompilation. Proc. of Black Hat Abu Dhabi,
pages 1–24.
Devries, P. D. (2016). An Analysis of Cryptocurrency, Bit-
coin, and the Future. International Journal of Business
Management and Commerce, 1(2):1–9.
Electroneum Ltd (2017). Electroneum overview & white
paper.
Enck, W., Octeau, D., McDaniel, P., and Swarat Chaudhuri
(2011). A Study of Android Application Security Wil-
liam. In Proceedings of the 20th USENIX Security
Symposium, pages 315–330.
Enck, W., Ongtang, M., and McDaniel, P. (2009). On Light-
weight Mobile Phone Application Certification. Pro-
ceedings of the 16th ACM conference on Computer and
communications security - CCS ’09, page 235.
Fahl, S., Harbach, M., Muders, T., Smith, M., Baumg
¨
artner,
L., and Freisleben, B. (2012). Why Eve and Mal-
lory Love Android: An Analysis of Android SSL
(In)Security. Proceedings of the 2012 ACM conference
on Computer and communications security - CCS ’12,
page 50.
Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D.,
and Shmatikov, V. (2012). The Most Dangerous
Code in theWorld: Validating SSL Certificates in Non-
Browser Software. In Proceedings of the 2012 ACM
conference on Computer and communications security
- CCS ’12, page 38, New York, New York, USA. ACM
Press.
Haldar, V., Chandra, D., and Franz, M. (2004). Semantic
remote attestation: a virtual machine directed approach
to trusted computing. In USENIX Virtual Machine
Research and Technology Symposium.
Huang, H., Zhu, S., Liu, P., and Wu, D. (2013). A Framework
for Evaluating Mobile App Repackaging Detection Al-
gorithms. In Huth, M., Asokan, N.,
ˇ
Capkun, S., Fle-
chais, I., and Coles-Kemp, L., editors, Trust and Trust-
worthy Computing, pages 169–186, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Jeong, J., Seo, D., Lee, C., Kwon, J., Lee, H., and Milburn, J.
(2014). MysteryChecker: Unpredictable attestation to
detect repackaged malicious applications in Android.
In 2014 9th International Conference on Malicious and
Unwanted Software: The Americas (MALWARE), pages
50–57. IEEE.
Jung, J.-H., Kim, J. Y., Lee, H.-C., and Yi, J. H. (2013). Re-
packaging Attack on Android Banking Applications
and Its Countermeasures. Wireless Personal Communi-
cations, 73(4):1421–1437.
Karbab, E. B., Debbabi, M., Derhab, A., and Mouheb, D.
(2016). Cypider: Building Community-Based Cyber-
Defense Infrastructure for Android Malware Detection.
ACSAC ’16 (32nd Annual Computer Security Applica-
tions Conference), pages 348–362.
Kudo, N., Yamauchi, T., and Austin, T. H. (2017). Access
Control for Plugins in Cordova-Based Hybrid Applica-
tions. In 2017 IEEE 31st International Conference on
Advanced Information Networking and Applications
(AINA), number 2, pages 1063–1069. IEEE.
Leng, F., Tan, C. M., and Pecht, M. (2015). Effect of Tem-
perature on the Aging rate of Li Ion Battery Opera-
ting above Room Temperature. Scientific Reports,
5(1):12967.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic
Cash System. www.bitcoin.org, page 9.
Nauman, M., Khan, S., Zhang, X., and Seifert, J.-P. (2010).
Beyond Kernel-Level Integrity Measurement: Enabling
Remote Attestation for the Android Platform. In
Acquisti, A., Smith, S. W., and Sadeghi, A.-R., editors,
Trust and Trustworthy Computing, pages 1–15, Berlin,
Heidelberg. Springer Berlin Heidelberg.
Ren, C., Chen, K., and Liu, P. (2014). Droidmarking: Re-
silient SoftwareWatermarking for Impeding Android
Application Repackaging. 29th ACM/IEEE internati-
onal conference on Automated software engineering,
pages 635–646.
Seigen, Jameson, M., Nieminen, T., Neocortex, and Juarez,
A. M. (2013). CryptoNight Hash Function.
Sounthiraraj, D., Sahs, J., Greenwood, G., Lin, Z., and Khan,
L. (2014). SMV-HUNTER: Large Scale, Automated
Detection of SSL/TLS Man-in-the-Middle Vulnerabi-
lities in Android Apps. In Proceedings 2014 Network
and Distributed System Security Symposium, number
February, pages 23–26, Reston, VA. Internet Society.
Vidas, T. and Christin, N. (2014). Evading Android Runtime
Analysis via Sandbox Detection. Proceedings of the
9th ACM symposium on Information, computer and
communications security - ASIA CCS ’14, pages 447–
458.
Zhou, W., Zhang, X., and Jiang, X. (2013). AppInk: Water-
marking Android Apps for Repackaging Deterrence.
In Proceedings of the 8th ACM SIGSAC symposium on
Information, computer and communications security
- ASIA CCS ’13, page 1, New York, New York, USA.
ACM Press.
Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes
387