Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Systematic classification of side-channel attacks: A case study for mobile devices
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Peeking behind the curtains of serverless platforms
Serverless computing is an emerging paradigm in which an application's resource
provisioning and scaling are managed by third-party services. Examples include AWS …
provisioning and scaling are managed by third-party services. Examples include AWS …
[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …
developers can write apps for IoT platforms using programming frameworks. Like other …
An improved P2P file system scheme based on IPFS and Blockchain
Y Chen, H Li, K Li, J Zhang - … Conference on Big Data (Big Data …, 2017 - ieeexplore.ieee.org
IPFS [1] is a peer-to-peer version controlled filesystem that synthesizes learnings from many
previous successful systems. IPFS combines a distributed Hash table, an incentivized block …
previous successful systems. IPFS combines a distributed Hash table, an incentivized block …
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …
on the voice channel to communicate with their users, which however is known to be …
Rendered insecure: GPU side channel attacks are practical
Graphics Processing Units (GPUs) are commonly integrated with computing devices to
enhance the performance and capabilities of graphical workloads. In addition, they are …
enhance the performance and capabilities of graphical workloads. In addition, they are …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
What the app is that? deception and countermeasures in the android user interface
Mobile applications are part of the everyday lives of billions of people, who often trust them
with sensitive information. These users identify the currently focused app solely by its visual …
with sensitive information. These users identify the currently focused app solely by its visual …
Cloak and dagger: from two permissions to complete control of the UI feedback loop
The effectiveness of the Android permission system fundamentally hinges on the user's
correct understanding of the capabilities of the permissions being granted. In this paper, we …
correct understanding of the capabilities of the permissions being granted. In this paper, we …