Charm: Facilitating dynamic analysis of device drivers of mobile systems
Mobile systems, such as smartphones and tablets, incorporate a diverse set of I/O devices,
such as camera, audio devices, GPU, and sensors. This in turn results in a large number of …
such as camera, audio devices, GPU, and sensors. This in turn results in a large number of …
AC4AV: A flexible and dynamic access control framework for connected and autonomous vehicles
Sensing data plays a pivotal role in connected and autonomous vehicles (CAVs), enabling
CAV to perceive surroundings. For example, malicious applications might tamper this life …
CAV to perceive surroundings. For example, malicious applications might tamper this life …
[PDF][PDF] 面向网络空间安全情报的知识图谱综述
董聪, 姜波, 卢志刚, 刘宝旭, 李宁, 马平川, 姜政伟… - 信息安全学报, 2020 - jcs.iie.ac.cn
摘要随着网络空间安全情报在网络犯罪, 网络战和网络反恐等领域的作用日益凸显,
迫切需要对网络空间安全情报的基本理论和综合分析方法进行深入研究. 当前 …
迫切需要对网络空间安全情报的基本理论和综合分析方法进行深入研究. 当前 …
Survey on access control mechanisms in cloud computing
The benefits that Internet-based applications and services have given to the end user with
today's cloud computing technology are very remarkable. The distributed services instantly …
today's cloud computing technology are very remarkable. The distributed services instantly …
{BigMAC}:{Fine-Grained} Policy Analysis of Android Firmware
The Android operating system is the world's dominant mobile computing platform. To defend
against malicious applications and external attack, Android relies upon a complex …
against malicious applications and external attack, Android relies upon a complex …
Analysis of SEAndroid policies: Combining MAC and DAC in Android
Android has become a dominant computing platform, and its popularity has coincided with a
surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is …
surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is …
Sifter: protecting security-critical kernel modules in Android through attack surface reduction
The Linux kernel is an important part of the Trusted Computing Base (TCB) of a mobile
device using the Android OS, making it attractive to attackers. While all vulnerabilities in the …
device using the Android OS, making it attractive to attackers. While all vulnerabilities in the …
Polyscope: Multi-policy access control analysis to triage android scoped storage
Android's filesystem access control is its foundation for system integrity. It combines
mandatory (eg, SELinux) and discretionary (eg, Unix permissions) access control with other …
mandatory (eg, SELinux) and discretionary (eg, Unix permissions) access control with other …
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems
Android's filesystem access control provides a foundation for system integrity. It combines
mandatory (eg, SEAndroid) and discretionary (eg, Unix permissions) access control …
mandatory (eg, SEAndroid) and discretionary (eg, Unix permissions) access control …