Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
Significant permission identification for machine-learning-based android malware detection
The alarming growth rate of malicious apps has become a serious issue that sets back the
prosperous mobile ecosystem. A recent report indicates that a new malicious app for …
prosperous mobile ecosystem. A recent report indicates that a new malicious app for …
Security analysis of emerging smart home applications
Recently, several competing smart home programming frameworks that support third party
app development have emerged. These frameworks provide tangible benefits to users, but …
app development have emerged. These frameworks provide tangible benefits to users, but …
[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …
amount and diversity of these applications render conventional defenses largely ineffective …
Soteria: Automated {IoT} safety and security analysis
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …
integrate physical processes with digital systems have changed the way we live, play and …
LLM platform security: Applying a systematic evaluation framework to OpenAI's ChatGPT plugins
Large language model (LLM) platforms, such as ChatGPT, have recently begun offering an
app ecosystem to interface with third-party services on the internet. While these apps extend …
app ecosystem to interface with third-party services on the internet. While these apps extend …
Stack overflow considered harmful? the impact of copy&paste on android application security
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …
information for software developers. Available information include vibrant discussions and …
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …
the research community to propose different detection techniques. However, the constant …