SLIDE 27 Chair for Network Architectures and Services Technische Universit¨ at M¨ unchen
Bibliography II
[8] A. Mahajan, M. S. Dahiya, and H. P . Sanghvi, “Forensic Analysis of Instant Messenger Applications on Android Devices,” CoRR, vol. abs/1304.4915, 2013. [9] A. Azfar, K.-K. R. Choo, and L. Liu, “Android Mobile VoIP apps: a Survey and Examination of Their Security and Privacy,” Electronic Commerce Research,
- vol. 16, no. 1, pp. 73–111, 2015.
[10] F. Karpisek, I. Baggili, and F. Breitinger, “WhatsApp Network Forensics: Decrypting and Understanding the WhatsApp Call Signaling Messages,” Digital Investigation, vol. 15, pp. 110–118, 2015. [11] T. Frosch, C. Mainka, C. Bader, F. Bergsma, J. Schwenk, and T. Holz, “How Secure is TextSecure?,” IACR Cryptology ePrint Archive, vol. 2014, p. 904, 2014. [12] M. Marlinspike, “Advanced Cryptographic Ratcheting,” 2013. [13] L. Onwuzurike and E. De Cristofaro, “Danger is my middle name: Experimenting with ssl vulnerabilities in android apps,” in Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec ’15, (New York, NY, USA), pp. 15:1–15:6, ACM, 2015. [14] M. Marlinspike, “Forward Secrecy for Asynchronous Messages,” 2016. [15] J. Ahrens, “Threema Protocol Analysis.” http: //blog.jan-ahrens.eu/files/threema-protocol-analysis.pdf, 2014.
- E. Hazboun – Investigating Mobile Messaging Security
27