Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities

BN Silva, M Khan, K Han - Sustainable cities and society, 2018 - Elsevier
Smart city is an application of Internet of Things (IoT) notion. Unceasing growth of population
and urbanization have intensified innovative ways to handle urbanization with minimal …

Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art

S Gupta, BB Gupta - … Journal of System Assurance Engineering and …, 2017 - Springer
Nowadays, web applications are becoming one of the standard platforms for representing
data and service releases over the World Wide Web. Since web applications are …

Automated dynamic firmware analysis at scale: a case study on embedded web interfaces

A Costin, A Zarras, A Francillon - Proceedings of the 11th ACM on Asia …, 2016 - dl.acm.org
Embedded devices are becoming more widespread, interconnected, and web-enabled than
ever. However, recent studies showed that embedded devices are far from being secure …

A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Panorama: capturing system-wide information flow for malware detection and analysis

H Yin, D Song, M Egele, C Kruegel… - Proceedings of the 14th …, 2007 - dl.acm.org
Malicious programs spy on users' behavior and compromise their privacy. Even software
from reputable vendors, such as Google Desktop and Sony DRM media player, may perform …

Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web

T Lauinger, A Chaabane, S Arshad… - arxiv preprint arxiv …, 2018 - arxiv.org
Web developers routinely rely on third-party Java-Script libraries such as jQuery to enhance
the functionality of their sites. However, if not properly maintained, such dependencies can …

An analysis of the dynamic behavior of JavaScript programs

G Richards, S Lebresne, B Burg, J Vitek - Proceedings of the 31st ACM …, 2010 - dl.acm.org
The JavaScript programming language is widely used for web programming and,
increasingly, for general purpose computing. As such, improving the correctness, security …