this paper was submitted on
1 point (100% like it)
1 up vote 0 down votes

papers

subscribe8 readers

Welcome to the public review site of papers appearing in MobiSys 2012. Here you can find the public review written by a PC member for each paper and the authors' rebuttal to it. You can comment on any of them or add your own opinion. Finally you can vote to "like" or "dislike" a paper by clicking the up or down arrows next to its title.

all 4 comments

[–]ConferenceQA 0 points1 point ago* 

sorry, this has been archived and can no longer be voted on

Q: MSFT - Given experience, and could fix 1 problem with a magic and, what would that be?

A: There are still many malware in PC world. Look there for inspiration?

[–]ConferenceQA 0 points1 point ago* 

sorry, this has been archived and can no longer be voted on

Q: (David Chu, Msft) You mentioned false positive analysis but did you do false negative analysis? Can you say more about this … how did you know that you didn’t miss malicious apps?

A: We verified manually for 3% of the apps we analyzed. (did not address the question directly)

[–]ConferenceQA 0 points1 point ago* 

sorry, this has been archived and can no longer be voted on

Q: UC Berkeley: How much of the malware was found via Google Play?

A: 50%

Q: Reachability analysis -- users schedule things for later e.g., server sending a message later. How will you deal with this?

A: Let's take this offline.

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: Your analysis based on family signatures. How would you cope with “new” families. Is there any feature set that you could use to discover exploits not known already?

A:No. For now, we focus only on known exploits. Future work.