On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ

M Lins, R Mayrhofer, M Roland, D Hofer… - arxiv preprint arxiv …, 2024 - arxiv.org
An emerging supply-chain attack due to a backdoor in XZ Utils has been identified. The
backdoor allows an attacker to run commands remotely on vulnerable servers utilizing SSH …

Survey of Real-World Process Sandboxing

A Niemi - 2024 35th Conference of Open Innovations …, 2024 - ieeexplore.ieee.org
Attackers often exploit vulnerabilities in network-facing processes to gain access to the rest
of the system. To combat this, modern operating systems such as Android, iOS and major …

A Data-Driven Evaluation of the Current Security State of Android Devices

E Leierzopf, R Mayrhofer, M Roland… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Android's fast-paced development cycles and the large number of devices from different
manufacturers do not allow for an easy comparison between different devices' security and …

[PDF][PDF] AUTHENTICATION FOR ANDROID USERS: A SECURITY PERSPECTIVE

L Stojković - ГЛОБАЛЬНІ ВИКЛИКИ ЛЮДСТВА … - sciencesociety.lnu.edu.ua
1. Introduction. When they first appeared, mobile devices were simple communication tools.
Today, however, they have evolved into essential resources, used not only for …