A survey on various threats and current state of security in android platform

P Bhat, K Dutta - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …

Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …

Ucrf: Static analyzing firmware to generate under-constrained seed for fuzzing soho router

C Qin, J Peng, P Liu, Y Zheng, K Cheng, W Zhang… - Computers & …, 2023 - Elsevier
SOHO (small office and home office) routers are the key elements of the IoT, providing
network services for various smart devices. Recent years have seen increased attacks …

Karonte: Detecting insecure multi-binary interactions in embedded firmware

N Redini, A Machiry, R Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …

Harnessing the power of llm to support binary taint analysis

P Liu, C Sun, Y Zheng, X Feng, C Qin, Y Wang… - arxiv preprint arxiv …, 2023 - arxiv.org
This paper proposes LATTE, the first static binary taint analysis that is powered by a large
language model (LLM). LATTE is superior to the state of the art (eg, Emtaint, Arbiter …

Teezz: Fuzzing trusted applications on cots android devices

M Busch, A Machiry, C Spensky… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Security and privacy-sensitive smartphone applications use trusted execution environments
(TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged …

[PDF][PDF] Periscope: An effective probing and fuzzing framework for the hardware-os boundary

D Song, F Hetzelt, D Das, C Spensky… - 2019 Network and …, 2019 - lirias.kuleuven.be
The OS kernel is an attractive target for remote attackers. If compromised, the kernel gives
adversaries full system access, including the ability to install rootkits, extract sensitive …

Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

J Vadayath, M Eckert, K Zeng, N Weideman… - 31st USENIX Security …, 2022 - usenix.org
In spite of their effectiveness in the context of vulnerability discovery, current state-of-the-art
binary program analysis approaches are limited by inherent trade-offs between accuracy …

{ARGUS}: A Framework for Staged Static Taint Analysis of {GitHub} Workflows and Actions

S Muralee, I Koishybayev, A Nahapetyan… - 32nd USENIX Security …, 2023 - usenix.org
Millions of software projects leverage automated workflows, like GitHub Actions, for
performing common build and deploy tasks. While GitHub Actions have greatly improved the …

Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique

ST Bukhari, MU Janjua, J Qadir - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Blockchain technology enables users to control and record their cryptocurrency transactions
through the use of digital wallets. As the use of blockchain technology and cryptocurrency …