ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis. Lei, Zeyu, Tuncay, G. S., Williem, B. C., Celik, Z. B., & Bianchi, A. In Network and Distributed System Security (NDSS) Symposium, pages 1–17, 2025.
Paper bibtex @inproceedings{Berkay2025ScopeVerifNDSS,
title={ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis},
author={{Lei, Zeyu and Tuncay, G{\"u}liz Seray and Williem, Beatrice Carissa and Celik, Z. Berkay and Bianchi, Antonio}},
booktitle={Network and Distributed System Security (NDSS) Symposium},
year={2025},
pages={1--17},
url = {https://beerkay.github.io/}
}
Downloads: 0
{"_id":"mQQ8iorPFj2QWoFw6","bibbaseid":"lei-tuncay-williem-celik-bianchi-scopeverifanalyzingthesecurityofandroidsscopedstorageviadifferentialanalysis-2025","author_short":["Lei, Zeyu","Tuncay, G. S.","Williem, B. C.","Celik, Z. B.","Bianchi, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis","author":[{"firstnames":[],"propositions":[],"lastnames":["Lei, Zeyu"],"suffixes":[]},{"propositions":[],"lastnames":["Tuncay"],"firstnames":["Güliz","Seray"],"suffixes":[]},{"propositions":[],"lastnames":["Williem"],"firstnames":["Beatrice","Carissa"],"suffixes":[]},{"propositions":[],"lastnames":["Celik"],"firstnames":["Z.","Berkay"],"suffixes":[]},{"propositions":[],"lastnames":["Bianchi"],"firstnames":["Antonio"],"suffixes":[]}],"booktitle":"Network and Distributed System Security (NDSS) Symposium","year":"2025","pages":"1–17","url":"https://beerkay.github.io/","bibtex":"@inproceedings{Berkay2025ScopeVerifNDSS,\n title={ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis},\n author={{Lei, Zeyu and Tuncay, G{\\\"u}liz Seray and Williem, Beatrice Carissa and Celik, Z. Berkay and Bianchi, Antonio}},\n booktitle={Network and Distributed System Security (NDSS) Symposium},\n year={2025},\n pages={1--17},\nurl = {https://beerkay.github.io/}\n}\n\n","author_short":["Lei, Zeyu","Tuncay, G. S.","Williem, B. C.","Celik, Z. B.","Bianchi, A."],"key":"Berkay2025ScopeVerifNDSS","id":"Berkay2025ScopeVerifNDSS","bibbaseid":"lei-tuncay-williem-celik-bianchi-scopeverifanalyzingthesecurityofandroidsscopedstorageviadifferentialanalysis-2025","role":"author","urls":{"Paper":"https://beerkay.github.io/"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://beerkay.github.io/papers/myPublications.bib","dataSources":["Z6kChNLF2NcgPrzyg","bc73Eqox2pPuwmAyT"],"keywords":[],"search_terms":["scopeverif","analyzing","security","android","scoped","storage","via","differential","analysis","lei","tuncay","williem","celik","bianchi"],"title":"ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis","year":2025,"downloads":3}