Vulnerability analysis of qualcomm secure execution environment (QSEE)

F Khalid, A Masood - Computers & Security, 2022 - Elsevier
TrustZone technology is used to implement Trusted Execution Environment (TEE) in mobile
devices. TEE is responsible for isolating and protecting the Trusted Computing Base (TCB) …

On the coordination of vulnerability fixes: An empirical study of practices from 13 CVE numbering authorities

J Lin, B Adams, AE Hassan - Empirical Software Engineering, 2023 - Springer
Abstract The Common Vulnerabilities and Exposures (CVE) program is dedicated to
analyzing vulnerabilities, then to assigning a unique ID to them and disclosing the …

{Defects-in-Depth}: Analyzing the Integration of Effective Defenses against {One-Day} Exploits in Android Kernels

L Maar, F Draschbacher, L Lamster… - 33rd USENIX Security …, 2024 - usenix.org
With the mobile phone market exceeding one billion units sold in 2023, ensuring the security
of these devices is critical. However, recent research has revealed worrying delays in the …

Vulnerability detection on android apps–inspired by case study on vulnerability related with web functions

J Qin, H Zhang, J Guo, S Wang, Q Wen, Y Shi - IEEE Access, 2020 - ieeexplore.ieee.org
Nowadays, people's lifestyle is more and more dependent on mobile applications (Apps),
such as shopping, financial management and surfing the internet. However, developers …

An empirical study of blockchain system vulnerabilities: Modules, types, and patterns

X Yi, D Wu, L Jiang, Y Fang, K Zhang… - Proceedings of the 30th …, 2022 - dl.acm.org
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for
enabling valuable cryptocurrencies and smart contracts. However, the blockchain software …

[PDF][PDF] 50 Shades of Support: A Device-Centric Analysis of Android Security Updates

A Acar, GS Tuncay, E Luques, H Oz… - Proceedings of the …, 2024 - ndss-symposium.org
Android is by far the most popular OS with over three billion active mobile devices. As in any
software, uncovering vulnerabilities on Android devices and applying timely patches are …

[PDF][PDF] A review and Case Study on android malware: Threat model, attacks, techniques and tools

C Negi, P Mishra, P Chaudhary… - Journal of Cyber …, 2021 - journals.riverpublishers.com
As android devices have increased in number in the past few years, the android operating
system has started dominating the smartphone market. The vast spread of android across all …

On Security Weaknesses and Vulnerabilities in Deep Learning Systems

Z Lai, H Chen, R Sun, Y Zhang, M Xue… - arXiv preprint arXiv …, 2024 - arxiv.org
The security guarantee of AI-enabled software systems (particularly using deep learning
techniques as a functional core) is pivotal against the adversarial attacks exploiting software …

A study on the testing of android security patches

CD Brant, T Yavuz - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
Android controls the majority of the global OS market. Android Open Source Project (AOSP)
is a very complex system with many layers including the apps, the Application Framework …

Unveiling the security vulnerabilities in android operating system

G Renjith, S Aji - Proceedings of Second International Conference on …, 2022 - Springer
Android is one of the biggest multi-featured operating systems in this decade. Android
Operating System (AOS) is the preferred choice for most smart use cases. Attacks targeting …