Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Significant permission identification for machine-learning-based android malware detection

J Li, L Sun, Q Yan, Z Li, W Srisa-An… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The alarming growth rate of malicious apps has become a serious issue that sets back the
prosperous mobile ecosystem. A recent report indicates that a new malicious app for …

Security analysis of emerging smart home applications

E Fernandes, J Jung, A Prakash - 2016 IEEE symposium on …, 2016 - ieeexplore.ieee.org
Recently, several competing smart home programming frameworks that support third party
app development have emerged. These frameworks provide tangible benefits to users, but …

[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.

D Arp, M Spreitzenbarth, M Hubner, H Gascon… - Ndss, 2014 - media.telefonicatech.com
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …

LLM platform security: Applying a systematic evaluation framework to OpenAI's ChatGPT plugins

U Iqbal, T Kohno, F Roesner - … of the AAAI/ACM Conference on AI …, 2024 - ojs.aaai.org
Large language model (LLM) platforms, such as ChatGPT, have recently begun offering an
app ecosystem to interface with third-party services on the internet. While these apps extend …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H **ao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)

L Onwuzurike, E Mariconti, P Andriotis… - ACM Transactions on …, 2019 - dl.acm.org
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …