The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …
developers can write apps for IoT platforms using programming frameworks. Like other …
Maps: Scaling privacy compliance analysis to a million apps
The app economy is largely reliant on data collection as its primary revenue model. To
comply with legal requirements, app developers are often obligated to notify users of their …
comply with legal requirements, app developers are often obligated to notify users of their …
[PDF][PDF] Automated analysis of privacy requirements for mobile apps
Mobile apps have to satisfy various privacy requirements. App publishers are often obligated
to provide a privacy policy and notify users of their apps' privacy practices. But how can we …
to provide a privacy policy and notify users of their apps' privacy practices. But how can we …
Beyond google play: A large-scale comparative study of chinese android app markets
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …
Google Play to buy and install Android apps, a number of independent app stores have …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …
people. Thus, researchers have applied automated bug finding techniques to improve their …
Constructing features for detecting android malicious applications: issues, taxonomy and directions
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …
WaVe: a verifiably secure WebAssembly sandboxing runtime
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …
benefits of hardwarebased memory protection without requiring operating system …