Evolution, detection and analysis of malware for smart devices

G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

IoT security: ongoing challenges and research opportunities

ZK Zhang, MCY Cho, CW Wang… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and
software to share and communicate information on the Internet. Given that the shared data …

Aff-wild: valence and arousal'In-the-Wild'challenge

S Zafeiriou, D Kollias, MA Nicolaou… - Proceedings of the …, 2017 - openaccess.thecvf.com
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …

[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.

YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes… - ndss, 2017 - cs.uwaterloo.ca
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

Aurasium: Practical policy enforcement for android applications

R Xu, H Saïdi, R Anderson - 21st USENIX Security Symposium (USENIX …, 2012 - usenix.org
The increasing popularity of Google's mobile platform Android makes it the prime target of
the latest surge in mobile malware. Most research on enhancing the platform's security and …

[PDF][PDF] Towards Taming Privilege-Escalation Attacks on Android.

S Bugiel, L Davi, A Dmitrienko, T Fischer… - …, 2012 - download.hrz.tu-darmstadt.de
Android's security framework has been an appealing subject of research in the last few
years. Android has been shown to be vulnerable to application-level privilege escalation …

Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications

C Yang, Z Xu, G Gu, V Yegneswaran… - … Security-ESORICS 2014 …, 2014 - Springer
Most existing malicious Android app detection approaches rely on manually selected
detection heuristics, features, and models. In this paper, we describe a new, complementary …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …