Vulnerability analysis of qualcomm secure execution environment (QSEE)
F Khalid, A Masood - Computers & Security, 2022 - Elsevier
TrustZone technology is used to implement Trusted Execution Environment (TEE) in mobile
devices. TEE is responsible for isolating and protecting the Trusted Computing Base (TCB) …
devices. TEE is responsible for isolating and protecting the Trusted Computing Base (TCB) …
On the coordination of vulnerability fixes: An empirical study of practices from 13 CVE numbering authorities
Abstract The Common Vulnerabilities and Exposures (CVE) program is dedicated to
analyzing vulnerabilities, then to assigning a unique ID to them and disclosing the …
analyzing vulnerabilities, then to assigning a unique ID to them and disclosing the …
{Defects-in-Depth}: Analyzing the Integration of Effective Defenses against {One-Day} Exploits in Android Kernels
With the mobile phone market exceeding one billion units sold in 2023, ensuring the security
of these devices is critical. However, recent research has revealed worrying delays in the …
of these devices is critical. However, recent research has revealed worrying delays in the …
Vulnerability detection on android apps–inspired by case study on vulnerability related with web functions
J Qin, H Zhang, J Guo, S Wang, Q Wen, Y Shi - IEEE Access, 2020 - ieeexplore.ieee.org
Nowadays, people's lifestyle is more and more dependent on mobile applications (Apps),
such as shopping, financial management and surfing the internet. However, developers …
such as shopping, financial management and surfing the internet. However, developers …
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for
enabling valuable cryptocurrencies and smart contracts. However, the blockchain software …
enabling valuable cryptocurrencies and smart contracts. However, the blockchain software …
[PDF][PDF] 50 Shades of Support: A Device-Centric Analysis of Android Security Updates
Android is by far the most popular OS with over three billion active mobile devices. As in any
software, uncovering vulnerabilities on Android devices and applying timely patches are …
software, uncovering vulnerabilities on Android devices and applying timely patches are …
[PDF][PDF] A review and Case Study on android malware: Threat model, attacks, techniques and tools
C Negi, P Mishra, P Chaudhary… - Journal of Cyber …, 2021 - journals.riverpublishers.com
As android devices have increased in number in the past few years, the android operating
system has started dominating the smartphone market. The vast spread of android across all …
system has started dominating the smartphone market. The vast spread of android across all …
On Security Weaknesses and Vulnerabilities in Deep Learning Systems
The security guarantee of AI-enabled software systems (particularly using deep learning
techniques as a functional core) is pivotal against the adversarial attacks exploiting software …
techniques as a functional core) is pivotal against the adversarial attacks exploiting software …
A study on the testing of android security patches
CD Brant, T Yavuz - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
Android controls the majority of the global OS market. Android Open Source Project (AOSP)
is a very complex system with many layers including the apps, the Application Framework …
is a very complex system with many layers including the apps, the Application Framework …
Unveiling the security vulnerabilities in android operating system
G Renjith, S Aji - Proceedings of Second International Conference on …, 2022 - Springer
Android is one of the biggest multi-featured operating systems in this decade. Android
Operating System (AOS) is the preferred choice for most smart use cases. Attacks targeting …
Operating System (AOS) is the preferred choice for most smart use cases. Attacks targeting …