[HTML][HTML] Enhancing mobile security through comprehensive penetration testing

M Roshanaei - Journal of Information Security, 2024‏ - scirp.org
In today's era, where mobile devices have become an integral part of our daily lives,
ensuring the security of mobile applications has become increasingly crucial. Mobile …

Demystifying the Security Implications in {IoT} Device Rental Services

Y He, Y Guan, R Lun, S Song, Z Guo, J Zhuge… - 33rd USENIX Security …, 2024‏ - usenix.org
Nowadays, unattended device rental services with cellular IoT controllers, such as e-
scooters and EV chargers, are widely deployed in public areas around the world, offering …

Principles of Designing Robust Remote Face Anti-Spoofing Systems

X Xu, T Zhao, Z Zhang, Z Li, J Wu, A Achille… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Protecting digital identities of human face from various attack vectors is paramount, and face
anti-spoofing plays a crucial role in this endeavor. Current approaches primarily focus on …

Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices

X **e, H Wang, Z Jian, T Li, W Wang… - IEEE INFOCOM 2024 …, 2024‏ - ieeexplore.ieee.org
Edge intelligence enables resource-demanding Deep Neural Network (DNN) inference
without transferring original data, addressing concerns about data privacy in consumer Inter …

Whatcha Lookin'At: Investigating Third-Party Web Content in Popular Android Apps

D Kuchhal, K Ramakrishnan, F Li - Proceedings of the 2024 ACM on …, 2024‏ - dl.acm.org
Over 65% of web traffic originates from mobile devices. However, much of this traffic is not
from mobile web browsers but rather from mobile apps displaying web content. Android's …

RDP: Ranked Differential Privacy for Facial Feature Protection in Multi-Scale Sparsified Subspaces

L Ou, S Liao, S Gao, G Huang… - IEEE Internet of Things …, 2025‏ - ieeexplore.ieee.org
With the widespread sharing of personal face images on the Internet, systems based on face
recognition encounter the real threat of being breached by potential adversaries who are …

MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems

C He, Y Zeng, X Ma, BB Zhu, Z Li… - 2024 IEEE International …, 2024‏ - ieeexplore.ieee.org
In our increasingly interconnected digital world, face recognition serves as a vital security
layer for identity verification. However, impersonation attacks pose a significant threat to face …

Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps

X Wang, K Luo, WC Lau - … on Applied Cryptography and Network Security, 2024‏ - Springer
Mobile apps are embracing facial recognition technology to streamline the identity
verification procedure for security-critical activities such as opening online bank accounts …

Benchmarking and Evaluating Large Language Models in Phishing Detection for Small and Midsize Enterprises: A Comprehensive Analysis

J Zhang, P Wu, J London, D Tenney - IEEE Access, 2025‏ - ieeexplore.ieee.org
The proliferation of Generative Artificial Intelligence (GenAI) has driven significant innovation
but also introduced new security risks, particularly in social engineering attacks such as …

[PDF][PDF] Building Trust In The Online Ecosystem Through Empirical Evaluations Of Web Security And Privacy Concerns

D Kuchhal - 2023‏ - dhruvkuchhal.com
First and foremost, I want to express my deepest gratitude to my advisor, Frank Li, for his
exemplary mentorship, endless patience, and steadfast support throughout my Ph. D …