Keyphrases
Targeted Attack
100%
Browser
100%
High-risk Population
100%
Baidu
78%
China
57%
Network Infrastructure
50%
At-risk
35%
Software Developers
35%
Private Data
35%
Cryptography
28%
Vulnerability
28%
Attacker
28%
Reverse Engineering
28%
Asia
28%
Source Code
21%
Man-in-the-middle
14%
Tencent
14%
Phylogenetic Clustering
14%
App Vendor
14%
Symmetric Cryptography
14%
User Device
14%
Common Source
14%
App Store
14%
Jeffreys
14%
GPS Coordinates
14%
Software Updates
14%
Network Delay
14%
Network Traffic
14%
Encryption Scheme
14%
Man-in-the-middle Attack
14%
Email Address
14%
Update Mechanism
14%
Hijack
7%
Encryption Key
7%
Keyword Filtering
7%
Nicknames
7%
CBC Mode
7%
Cryptography Key
7%
Blacklist
7%
Social Media Apps
7%
Security Updates
7%
Asian Countries
7%
Third-party Applications
7%
Android Users
7%
Language Support
7%
App Users
7%
Chat Services
7%
Code Reuse
7%
Malicious Networks
7%
Engineering Apps
7%
Coordinate Search
7%
Host Government
7%
Three-web
7%
Phishing Attack
7%
Encrypted Messaging
7%
Random number Generator
7%
Weak Keys
7%
Passive Observer
7%
Sucking
7%
App Markets
7%
Face Threat
7%
Buffer Overflow
7%
Information Leakage
7%
Tightly Coupled Integration
7%
Corporate
7%
Internet Freedom
7%
Knowledge-how
7%
Search Terms
7%
Network Condition
7%
Cybersecurity Research
7%
University of Toronto
7%
Eavesdropper
7%
Manual Method
7%
Malware
7%
Local Partner
7%
Google Android
7%
Chrome
7%
Upload
7%
Hidden Features
7%
Personal Data
7%
Analytics Software
7%
Wi-Fi Networks
7%
Encryption
7%
Penetration Rate
7%
Plaintext
7%
Phylogeny
7%
Security Gap
7%
Decrypt
7%
User Data
7%
Use Code
7%
Internet Infrastructure
7%
Web Browser
7%
Keyword-based
7%
Mobile Browser
7%
Specific Goals
7%
Lack of Infrastructure
7%
Firefox
7%
Heavy Use
7%
Web Interface
7%
Complete Control
7%
Parsing
7%
Messaging Apps
7%
Local Languages
7%
Smartphone Application
7%
Direct Engagement
7%
Plethora
7%
Local Organizations
7%
GitHub
7%
Software Ecosystems
7%
Typical User
7%
Publicly Available
7%
Backdoor
7%
Computer Science
Risk Population
100%
Targeted Attack
100%
Network Infrastructure
100%
Software Developer
71%
Reverse Engineering
57%
Attackers
57%
Update Mechanism
28%
Symmetric Cryptography
28%
Global Positioning System
28%
Encryption Scheme
28%
Man-in-the-Middle Attack
28%
Modified Version
28%
Network Traffic
28%
Software Update
28%
Information Leak
14%
Buffer Overflow
14%
Messaging Service
14%
Firefox
14%
Local Language
14%
Keyword Filtering
14%
Authenticated User
14%
Web Service Interface
14%
encryption key
14%
Code Reuse
14%
Phishing Attack
14%
Internet Infrastructure
14%
Chat
14%
Smartphone Application
14%
Tight Integration
14%
Personal Data
14%
Random Number Generator
14%
Android
14%
Problem Statement
14%
User Data
14%
Party Application
14%
Arbitrary Code
14%
Connected Network
14%
Open Source
14%
Advanced Encryption Standard
14%
Cybersecurity
14%
e-Mail
14%
Large Data Set
14%
Web Browser
14%
Malware
14%
Network Condition
14%