A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …

Empowering network security with programmable switches: A comprehensive survey

X Chen, C Wu, X Liu, Q Huang, D Zhang… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
With the growth of network applications such as 5G and artificial intelligence, network
security techniques, ie, the techniques that detect various attacks (eg, well-known denial-of …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Privacy leakage of location sharing in mobile social networks: Attacks and defense

H Li, H Zhu, S Du, X Liang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Along with the popularity of mobile social networks (MSNs) is the increasing danger of
privacy breaches due to user location exposures. In this work, we take an initial step towards …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

A mobile malware detection method using behavior features in network traffic

S Wang, Z Chen, Q Yan, B Yang, L Peng… - Journal of Network and …, 2019 - Elsevier
Android has become the most popular mobile platform due to its openness and flexibility.
Meanwhile, it has also become the main target of massive mobile malware. This …

{vTZ}: virtualizing {ARM}{TrustZone}

Z Hua, J Gu, Y **a, H Chen, B Zang… - 26th USENIX Security …, 2017 - usenix.org
ARM TrustZone, a security extension that provides a secure world, a trusted execution
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

EveDroid: Event-aware Android malware detection against model degrading for IoT devices

T Lei, Z Qin, Z Wang, Q Li, D Ye - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
With the proliferation of the smart Internet of Things (IoT) devices based on Android system,
malicious Android applications targeting for IoT devices have received more and more …

A two-layer deep learning method for android malware detection using network traffic

J Feng, L Shen, Z Chen, Y Wang, H Li - Ieee Access, 2020 - ieeexplore.ieee.org
Because of the characteristic of openness and flexibility, Android has become the most
popular mobile platform. However, it has also become the most targeted system by mobile …