Evolution, detection and analysis of malware for smart devices
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …
Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
IoT security: ongoing challenges and research opportunities
ZK Zhang, MCY Cho, CW Wang… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and
software to share and communicate information on the Internet. Given that the shared data …
software to share and communicate information on the Internet. Given that the shared data …
Aff-wild: valence and arousal'In-the-Wild'challenge
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …
benchmark for assessing the performance of facial affect/behaviour analysis …
[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …
developers can write apps for IoT platforms using programming frameworks. Like other …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
Aurasium: Practical policy enforcement for android applications
The increasing popularity of Google's mobile platform Android makes it the prime target of
the latest surge in mobile malware. Most research on enhancing the platform's security and …
the latest surge in mobile malware. Most research on enhancing the platform's security and …
[PDF][PDF] Towards Taming Privilege-Escalation Attacks on Android.
Android's security framework has been an appealing subject of research in the last few
years. Android has been shown to be vulnerable to application-level privilege escalation …
years. Android has been shown to be vulnerable to application-level privilege escalation …
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
Most existing malicious Android app detection approaches rely on manually selected
detection heuristics, features, and models. In this paper, we describe a new, complementary …
detection heuristics, features, and models. In this paper, we describe a new, complementary …
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …