Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities
Smart city is an application of Internet of Things (IoT) notion. Unceasing growth of population
and urbanization have intensified innovative ways to handle urbanization with minimal …
and urbanization have intensified innovative ways to handle urbanization with minimal …
Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …
techniques in security analyses. Example applications of dynamic taint analysis and forward …
Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art
S Gupta, BB Gupta - … Journal of System Assurance Engineering and …, 2017 - Springer
Nowadays, web applications are becoming one of the standard platforms for representing
data and service releases over the World Wide Web. Since web applications are …
data and service releases over the World Wide Web. Since web applications are …
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than
ever. However, recent studies showed that embedded devices are far from being secure …
ever. However, recent studies showed that embedded devices are far from being secure …
A survey on automated dynamic malware-analysis techniques and tools
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …
Receiving thousands of new samples every day is not uncommon. The signatures that …
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users' behavior and compromise their privacy. Even software
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
Web developers routinely rely on third-party Java-Script libraries such as jQuery to enhance
the functionality of their sites. However, if not properly maintained, such dependencies can …
the functionality of their sites. However, if not properly maintained, such dependencies can …
An analysis of the dynamic behavior of JavaScript programs
G Richards, S Lebresne, B Burg, J Vitek - Proceedings of the 31st ACM …, 2010 - dl.acm.org
The JavaScript programming language is widely used for web programming and,
increasingly, for general purpose computing. As such, improving the correctness, security …
increasingly, for general purpose computing. As such, improving the correctness, security …