{FlowFence}: Practical data protection for emerging {IoT} application frameworks

E Fernandes, J Paupore, A Rahmati… - 25th USENIX security …, 2016 - usenix.org
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

Appcontext: Differentiating malicious and benign mobile app behaviors using context

W Yang, X **ao, B Andow, S Li, T **e… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Mobile malware attempts to evade detection during app analysis by mimicking security-
sensitive behaviors of benign apps that provide similar functionality (eg, sending SMS …

[PDF][PDF] Airavat: Security and privacy for MapReduce.

I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel - NSDI, 2010 - usenix.org
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …

Runtime analysis of whole-system provenance

T Pasquier, X Han, T Moyer, A Bates… - Proceedings of the …, 2018 - dl.acm.org
Identifying the root cause and impact of a system intrusion remains a foundational challenge
in computer security. Digital provenance provides a detailed history of the flow of information …

Sapper: A language for hardware-level security policy enforcement

X Li, V Kashyap, JK Oberg, M Tiwari… - Proceedings of the 19th …, 2014 - dl.acm.org
Privacy and integrity are important security concerns. These concerns are addressed by
controlling information flow, ie, restricting how information can flow through a system. Most …

MalPat: Mining patterns of malicious and benign Android apps via permission-related APIs

G Tao, Z Zheng, Z Guo, MR Lyu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The dramatic rise of Android application (app) marketplaces has significantly gained the
success of convenience for mobile users. Consequently, with the advantage of numerous …

Hails: Protecting data privacy in untrusted web applications

DB Giffin, A Levy, D Stefan, D Terei… - … USENIX Symposium on …, 2012 - usenix.org
Modern extensible web platforms like Facebook and Yammer depend on third-party
software to offer a rich experience to their users. Unfortunately, users running a third-party …

Information flow control for secure cloud computing

J Bacon, D Eyers, TFJM Pasquier… - … on network and …, 2014 - ieeexplore.ieee.org
Security concerns are widely seen as an obstacle to the adoption of cloud computing
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …

Phosphor: Illuminating dynamic data flow in commodity jvms

J Bell, G Kaiser - ACM Sigplan Notices, 2014 - dl.acm.org
Dynamic taint analysis is a well-known information flow analysis problem with many
possible applications. Taint tracking allows for analysis of application data flow by assigning …