Containing malicious package updates in npm with a lightweight permission system
G Ferreira, L Jia, J Sunshine… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
The large amount of third-party packages available in fast-moving software ecosystems,
such as Node. js/npm, enables attackers to compromise applications by pushing malicious …
such as Node. js/npm, enables attackers to compromise applications by pushing malicious …
Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification
FH da Costa, I Medeiros, T Menezes, JV da Silva… - Journal of Systems and …, 2022 - Elsevier
The popularization of the Android platform and the growing number of Android applications
(apps) that manage sensitive data turned the Android ecosystem into an attractive target for …
(apps) that manage sensitive data turned the Android ecosystem into an attractive target for …
{TrustBase}: An architecture to repair and strengthen certificate-based authentication
M O'Neill, S Heidbrink, S Ruoti, J Whitehead… - 26th USENIX Security …, 2017 - usenix.org
The current state of certificate-based authentication is messy, with broken authentication in
applications and proxies, along with serious flaws in the CA system. To solve these …
applications and proxies, along with serious flaws in the CA system. To solve these …
Sandbox Innovation: Potentials and Impacts
L Koycheva, A VandenBroek - Practicing Anthropology, 2024 - Taylor & Francis
We introduce this collection on" sandbox innovation," where innovative practices are
separated and nurtured within a confined, risk-controlled environment, akin to a child's …
separated and nurtured within a confined, risk-controlled environment, akin to a child's …
Fused sensor analysis and advanced control of industrial field devices for security: Cymbiote multi-source sensor fusion platform
T Rice, G Seppala, TW Edgar, D Cain… - Proceedings of the …, 2019 - dl.acm.org
Embedded field devices that sense and control physical processes in critical infrastructure
are soft targets for cyber-attack because they lack the fundamental features for existing cyber …
are soft targets for cyber-attack because they lack the fundamental features for existing cyber …
Sandboxing Adoption in Open Source Ecosystems
Sandboxing mechanisms allow developers to limit how much access applications have to
resources, following the least-privilege principle. However, it's not clear how much and in …
resources, following the least-privilege principle. However, it's not clear how much and in …
[PDF][PDF] An Integrated Checklist for Architecture Design of Critical Software Systems.
With the advancement of digitalization, critical information infrastructures, such as intelligent
energy distribution, transportation, or healthcare, have opened themselves towards …
energy distribution, transportation, or healthcare, have opened themselves towards …
Disrupting SthlmTech: An Anthropological Guide to Stockholm's Innovation Ecosystem
AK VandenBroek - 2021 - search.proquest.com
In 2013, a group of entrepreneurs, investors, evangelists, and enthusiasts gathered at the
Hilton Slussen in Stockholm and voted to create the hashtag# SthlmTech to describe the …
Hilton Slussen in Stockholm and voted to create the hashtag# SthlmTech to describe the …
Mitigating cryptographic mistakes by design
M Blochberger, T Petersen, H Federrath - 2019 - dl.gi.de
Developers struggle to integrate cryptographic functionality into their applications. Many
mistakes have been identified by related work and tools have been developed for detecting …
mistakes have been identified by related work and tools have been developed for detecting …
Impacto teórico-práctico del BYOD en el derecho del trabajo
OC Chueca - Revista de Trabajo y Seguridad Social. CEF, 2018 - revistas.cef.udima.es
El «propietarismo» ha venido siendo la visión imperante que los tribunales españoles han
adoptado para el análisis jurídico-laboral de las nuevas tecnologías, pero la utilización de …
adoptado para el análisis jurídico-laboral de las nuevas tecnologías, pero la utilización de …