Evolution, detection and analysis of malware for smart devices

G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Cyber and physical security vulnerability assessment for IoT-based smart homes

B Ali, AI Awad - sensors, 2018 - mdpi.com
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices,
objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated …

[PDF][PDF] Execute this! analyzing unsafe and malicious dynamic code loading in android applications.

S Poeplau, Y Fratantonio, A Bianchi, C Kruegel… - NDSS, 2014 - lilicoding.github.io
The design of the Android system allows applications to load additional code from external
sources at runtime. On the one hand, malware can use this capability to add malicious …

Probabilistic graph and hypergraph matching

R Zass, A Shashua - … IEEE Conference on Computer Vision and …, 2008 - ieeexplore.ieee.org
We consider the problem of finding a matching between two sets of features, given complex
relations among them, going beyond pairwise. Each feature set is modeled by a hypergraph …

Identity confusion in {WebView-based} mobile app-in-app ecosystems

L Zhang, Z Zhang, A Liu, Y Cao, X Zhang… - 31st USENIX Security …, 2022 - usenix.org
Mobile applications (apps) often delegate their own functions to other parties, which makes
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …

A stitch in time: Supporting android developers in writingsecure code

DC Nguyen, D Wermke, Y Acar, M Backes… - Proceedings of the …, 2017 - dl.acm.org
Despite security advice in the official documentation and an extensive body of security
research about vulnerabilities and exploits, many developers still fail to write secure Android …

The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation

X **, X Hu, K Ying, W Du, H Yin, GN Peri - Proceedings of the 2014 …, 2014 - dl.acm.org
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …

Conceptual framework for the security of mobile health applications on android platform

M Hussain, AA Zaidan, BB Zidan, S Iqbal… - Telematics and …, 2018 - Elsevier
Mobile Health (mHealth) applications are readily accessible to the average user of mobile
devices, and despite the potential of mHealth applications to improve the availability …