Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Android security: a survey of issues, malware penetration, and defenses

P Faruki, A Bharmal, V Laxmi… - … surveys & tutorials, 2014 - ieeexplore.ieee.org
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …

{ARMageddon}: Cache attacks on mobile devices

M Lipp, D Gruss, R Spreitzer, C Maurice… - 25th USENIX Security …, 2016 - usenix.org
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

Chex: statically vetting android apps for component hijacking vulnerabilities

L Lu, Z Li, Z Wu, W Lee, G Jiang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …

Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis

D Octeau, P McDaniel, S Jha, A Bartel… - 22nd USENIX Security …, 2013 - usenix.org
Many threats present in smartphones are the result of interactions between application
components, not just artifacts of single components. However, current techniques for …

[PDF][PDF] Towards Taming Privilege-Escalation Attacks on Android.

S Bugiel, L Davi, A Dmitrienko, T Fischer… - …, 2012 - download.hrz.tu-darmstadt.de
Android's security framework has been an appealing subject of research in the last few
years. Android has been shown to be vulnerable to application-level privilege escalation …

A survey of malware detection in Android apps: Recommendations and perspectives for future research

A Razgallah, R Khoury, S Hallé… - Computer Science …, 2021 - Elsevier
Android has dominated the smartphone market and has become the most popular operating
system for mobile devices. However, security threats in Android applications have also …

Evolution, detection and analysis of malware for smart devices

G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …

[PDF][PDF] Quire: Lightweight provenance for smart phone operating systems

M Dietz, S Shekhar, Y Pisetsky, A Shu… - USENIX security …, 2011 - usenix.org
Smartphone apps are often granted to privilege to run with access to the network and
sensitive local resources. This makes it difficult for remote endpoints to place any trust in the …