{FlowFence}: Practical data protection for emerging {IoT} application frameworks
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …
data produced by smart homes and wearables. However, these frameworks only support …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
Appcontext: Differentiating malicious and benign mobile app behaviors using context
Mobile malware attempts to evade detection during app analysis by mimicking security-
sensitive behaviors of benign apps that provide similar functionality (eg, sending SMS …
sensitive behaviors of benign apps that provide similar functionality (eg, sending SMS …
[PDF][PDF] Airavat: Security and privacy for MapReduce.
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
Runtime analysis of whole-system provenance
Identifying the root cause and impact of a system intrusion remains a foundational challenge
in computer security. Digital provenance provides a detailed history of the flow of information …
in computer security. Digital provenance provides a detailed history of the flow of information …
Sapper: A language for hardware-level security policy enforcement
Privacy and integrity are important security concerns. These concerns are addressed by
controlling information flow, ie, restricting how information can flow through a system. Most …
controlling information flow, ie, restricting how information can flow through a system. Most …
MalPat: Mining patterns of malicious and benign Android apps via permission-related APIs
The dramatic rise of Android application (app) marketplaces has significantly gained the
success of convenience for mobile users. Consequently, with the advantage of numerous …
success of convenience for mobile users. Consequently, with the advantage of numerous …
Hails: Protecting data privacy in untrusted web applications
Modern extensible web platforms like Facebook and Yammer depend on third-party
software to offer a rich experience to their users. Unfortunately, users running a third-party …
software to offer a rich experience to their users. Unfortunately, users running a third-party …
Information flow control for secure cloud computing
Security concerns are widely seen as an obstacle to the adoption of cloud computing
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …
Phosphor: Illuminating dynamic data flow in commodity jvms
Dynamic taint analysis is a well-known information flow analysis problem with many
possible applications. Taint tracking allows for analysis of application data flow by assigning …
possible applications. Taint tracking allows for analysis of application data flow by assigning …