Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.

D Arp, M Spreitzenbarth, M Hubner, H Gascon… - Ndss, 2014 - media.telefonicatech.com
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …

Dissecting android malware: Characterization and evolution

Y Zhou, X Jiang - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
The popularity and adoption of smart phones has greatly stimulated the spread of mobile
malware, especially on the popular platforms such as Android. In light of their rapid growth …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Security analysis of emerging smart home applications

E Fernandes, J Jung, A Prakash - 2016 IEEE symposium on …, 2016 - ieeexplore.ieee.org
Recently, several competing smart home programming frameworks that support third party
app development have emerged. These frameworks provide tangible benefits to users, but …

Significant permission identification for machine-learning-based android malware detection

J Li, L Sun, Q Yan, Z Li, W Srisa-An… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The alarming growth rate of malicious apps has become a serious issue that sets back the
prosperous mobile ecosystem. A recent report indicates that a new malicious app for …

Android permissions: User attention, comprehension, and behavior

AP Felt, E Ha, S Egelman, A Haney, E Chin… - Proceedings of the …, 2012 - dl.acm.org
Android's permission system is intended to inform users about the risks of installing
applications. When a user installs an application, he or she has the opportunity to review the …

Droidapiminer: Mining api-level features for robust malware detection in android

Y Aafer, W Du, H Yin - International conference on security and privacy in …, 2013 - Springer
The increasing popularity of Android apps makes them the target of malware authors. To
defend against this severe increase of Android malwares and help users make a better …

Pscout: analyzing the android permission specification

KWY Au, YF Zhou, Z Huang, D Lie - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …