Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When the User Is Inside the User Interface: An Empirical Study of {UI} Security Properties in Augmented Reality
Augmented reality (AR) experiences place users inside the user interface (UI), where they
can see and interact with three-dimensional virtual content. This paper explores UI security …
can see and interact with three-dimensional virtual content. This paper explores UI security …
Analyzing ground-truth data of mobile gambling scams
With the growth of mobile computing techniques, mobile gambling scams have seen a
rampant increase in the recent past. In mobile gambling scams, miscreants deliver …
rampant increase in the recent past. In mobile gambling scams, miscreants deliver …
Detecting and measuring misconfigured manifests in android apps
The manifest file of an Android app is crucial for app security as it declares sensitive app
configurations, such as access permissions required to access app components …
configurations, such as access permissions required to access app components …
{iOS}, your {OS}, everybody's {OS}: Vetting and analyzing network services of {iOS} applications
Smartphone applications that listen for network connections introduce significant security
and privacy threats for users. In this paper, we focus on vetting and analyzing the security of …
and privacy threats for users. In this paper, we focus on vetting and analyzing the security of …
{iHunter}: Hunting Privacy Violations at Scale in the Software Supply Chain on {iOS}
Privacy violations and compliance issues in mobile apps are serious concerns for users,
developers, and regulators. With many off-the-shelf tools on Android, prior works extensively …
developers, and regulators. With many off-the-shelf tools on Android, prior works extensively …
Understanding and Detecting Abused Image Hosting Modules as Malicious Services
As a new type of underground ecosystem, the exploitation of Abused IHMs as MalIcious
sErvices (AIMIEs) is becoming increasingly prevalent among miscreants to host illegal …
sErvices (AIMIEs) is becoming increasingly prevalent among miscreants to host illegal …
CydiOS: A Model-Based Testing Framework for iOS Apps
To make an app stand out in an increasingly competitive market, developers must ensure its
quality to deliver a better user experience. UI testing is a popular technique for quality …
quality to deliver a better user experience. UI testing is a popular technique for quality …
Automated binary analysis: A survey
Binary code analysis is a process of analyzing the software or operating system when
source code is inaccessible. This scenario occurs when one needs to analyze malware, a …
source code is inaccessible. This scenario occurs when one needs to analyze malware, a …
No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS
The rise of malicious mobile applications poses a significant threat to users and app stores.
While iOS apps have generally been considered more secure due to strict review processes …
While iOS apps have generally been considered more secure due to strict review processes …
Understanding and Identifying Cross-platform UI Framework based Potentially Unwanted Apps
Cross-platform UI frameworks may facilitate a new category of Potentially Unwanted Apps,
dubbed XPUAs, which uses framework-specific language to implement its UI in the form of …
dubbed XPUAs, which uses framework-specific language to implement its UI in the form of …