A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps

F Wei, S Roy, X Ou, Robby - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
We present a new approach to static analysis for security vetting of Android apps and a
general framework called Amandroid. Amandroid determines points-to information for all …

Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem

A Razaghpanah, R Nithyanand… - The 25th Annual …, 2018 - dspace.networks.imdea.org
Third-party services form an integral part of the mobile ecosystem: they ease application
development and enable features such as analytics, social network integration, and app …

Are iphones really better for privacy? comparative study of ios and android apps

K Kollnig, A Shuba, R Binns, M Van Kleek… - arxiv preprint arxiv …, 2021 - arxiv.org
While many studies have looked at privacy properties of the Android and Google Play app
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …

Model-reuse attacks on deep learning systems

Y Ji, X Zhang, S Ji, X Luo, T Wang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Many of today's machine learning (ML) systems are built by reusing an array of, often pre-
trained, primitive models, each fulfilling distinct functionality (eg, feature extraction). The …

Keep me updated: An empirical study of third-party library updatability on android

E Derr, S Bugiel, S Fahl, Y Acar, M Backes - Proceedings of the 2017 …, 2017 - dl.acm.org
Third-party libraries in Android apps have repeatedly been shown to be hazards to the
users' privacy and an amplification of their host apps' attack surface. A particularly …

An empirical study of usages, updates and risks of third-party libraries in java projects

Y Wang, B Chen, K Huang, B Shi, C Xu… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Third-party libraries play a key role in software development as they can relieve developers
of the heavy burden of re-implementing common functionalities. However, third-party …

Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web

T Lauinger, A Chaabane, S Arshad… - arxiv preprint arxiv …, 2018 - arxiv.org
Web developers routinely rely on third-party Java-Script libraries such as jQuery to enhance
the functionality of their sites. However, if not properly maintained, such dependencies can …