A survey on various threats and current state of security in android platform
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …
the masses. The latest technologies have made it affordable for every section of the society …
Finding a needle in a haystack: Automated mining of silent vulnerability fixes
Following the coordinated vulnerability disclosure model, a vulnerability in open source
software (OSS) is sug-gested to be fixed" silently", without disclosing the fix until the …
software (OSS) is sug-gested to be fixed" silently", without disclosing the fix until the …
{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures
Recurring vulnerabilities widely exist and remain undetected in real-world systems, which
are often resulted from reused code base or shared code logic. However, the potentially …
are often resulted from reused code base or shared code logic. However, the potentially …
{RapidPatch}: firmware hotpatching for {Real-Time} embedded devices
Nowadays real-time embedded devices are becoming one main target of cyber attacks. A
huge number of embedded devices equipped with outdated firmware are subject to various …
huge number of embedded devices equipped with outdated firmware are subject to various …
Pdiff: Semantic-based patch presence testing for downstream kernels
Open-source kernels have been adopted by massive downstream vendors on billions of
devices. However, these vendors often omit or delay the adoption of patches released in the …
devices. However, these vendors often omit or delay the adoption of patches released in the …
[PDF][PDF] Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Mobile application developers rely heavily on opensource software (OSS) to offload
common functionalities such as the implementation of protocols and media format playback …
common functionalities such as the implementation of protocols and media format playback …
Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking
Security patches play an important role in defending against the security threats brought by
the increasing OSS vulnerabilities. However, the collection of security patches still remains a …
the increasing OSS vulnerabilities. However, the collection of security patches still remains a …
{Defects-in-Depth}: Analyzing the Integration of Effective Defenses against {One-Day} Exploits in Android Kernels
With the mobile phone market exceeding one billion units sold in 2023, ensuring the security
of these devices is critical. However, recent research has revealed worrying delays in the …
of these devices is critical. However, recent research has revealed worrying delays in the …
Machine learning predictive framework for CO2 thermodynamic properties in solution
CO 2 is the major greenhouse gas (GHG) emission throughout the world. For scientific and
industrial purposes, chemical absorption is regarded as an efficient method to capture CO 2 …
industrial purposes, chemical absorption is regarded as an efficient method to capture CO 2 …
Automatic hot patch generation for android kernels
The rapid growth of the Android ecosystem has led to the fragmentation problem where a
wide range of (customized) versions of Android OS exist in the market. This poses a severe …
wide range of (customized) versions of Android OS exist in the market. This poses a severe …