A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Goodbye tracking? Impact of iOS app tracking transparency and privacy labels

K Kollnig, A Shuba, M Van Kleek, R Binns… - Proceedings of the …, 2022 - dl.acm.org
Tracking is a highly privacy-invasive data collection practice that has been ubiquitous in
mobile apps for many years due to its role in supporting advertising-based revenue models …

[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.

YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes… - ndss, 2017 - cs.uwaterloo.ca
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …

Boms away! inside the minds of stakeholders: A comprehensive study of bills of materials for software systems

T Stalnaker, N Wintersgill, O Chaparro… - Proceedings of the 46th …, 2024 - dl.acm.org
Software Bills of Materials (SBOMs) have emerged as tools to facilitate the management of
software dependencies, vulnerabilities, licenses, and the supply chain. While significant …

Are iphones really better for privacy? comparative study of ios and android apps

K Kollnig, A Shuba, R Binns, M Van Kleek… - arxiv preprint arxiv …, 2021 - arxiv.org
While many studies have looked at privacy properties of the Android and Google Play app
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …

Model-reuse attacks on deep learning systems

Y Ji, X Zhang, S Ji, X Luo, T Wang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Many of today's machine learning (ML) systems are built by reusing an array of, often pre-
trained, primitive models, each fulfilling distinct functionality (eg, feature extraction). The …

Libd: Scalable and precise third-party library detection in android markets

M Li, W Wang, P Wang, S Wang, D Wu… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
With the thriving of the mobile app markets, third-party libraries are pervasively integrated in
the Android applications. Third-party libraries provide functionality such as advertisements …

A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Remos: Reducing defect inheritance in transfer learning via relevant model slicing

Z Zhang, Y Li, J Wang, B Liu, D Li, Y Guo… - Proceedings of the 44th …, 2022 - dl.acm.org
Transfer learning is a popular software reuse technique in the deep learning community that
enables developers to build custom models (students) based on sophisticated pretrained …