Charm: Facilitating dynamic analysis of device drivers of mobile systems

SMS Talebi, H Tavakoli, H Zhang, Z Zhang… - 27th USENIX Security …, 2018 - usenix.org
Mobile systems, such as smartphones and tablets, incorporate a diverse set of I/O devices,
such as camera, audio devices, GPU, and sensors. This in turn results in a large number of …

AC4AV: A flexible and dynamic access control framework for connected and autonomous vehicles

Q Zhang, H Zhong, J Cui, L Ren… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Sensing data plays a pivotal role in connected and autonomous vehicles (CAVs), enabling
CAV to perceive surroundings. For example, malicious applications might tamper this life …

[PDF][PDF] 面向网络空间安全情报的知识图谱综述

董聪, 姜波, 卢志刚, 刘宝旭, 李宁, 马平川, 姜政伟… - 信息安全学报, 2020 - jcs.iie.ac.cn
摘要随着网络空间安全情报在网络犯罪, 网络战和网络反恐等领域的作用日益凸显,
迫切需要对网络空间安全情报的基本理论和综合分析方法进行深入研究. 当前 …

Survey on access control mechanisms in cloud computing

G Karatas, A Akbulut - Journal of Cyber Security and …, 2018 - journals.riverpublishers.com
The benefits that Internet-based applications and services have given to the end user with
today's cloud computing technology are very remarkable. The distributed services instantly …

{BigMAC}:{Fine-Grained} Policy Analysis of Android Firmware

G Hernandez, DJ Tian, AS Yadav, BJ Williams… - 29th USENIX Security …, 2020 - usenix.org
The Android operating system is the world's dominant mobile computing platform. To defend
against malicious applications and external attack, Android relies upon a complex …

Analysis of SEAndroid policies: Combining MAC and DAC in Android

H Chen, N Li, W Enck, Y Aafer, X Zhang - Proceedings of the 33rd …, 2017 - dl.acm.org
Android has become a dominant computing platform, and its popularity has coincided with a
surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is …

[图书][B] Computing Systems for Autonomous Driving

W Shi, L Liu - 2021 - Springer
In the last 5 years, with the vast improvements in computing technologies, eg, sensors,
computer vision, machine learning, and hardware acceleration, and the wide deployment of …

Sifter: protecting security-critical kernel modules in Android through attack surface reduction

HW Hung, Y Liu, AA Sani - Proceedings of the 28th Annual International …, 2022 - dl.acm.org
The Linux kernel is an important part of the Trusted Computing Base (TCB) of a mobile
device using the Android OS, making it attractive to attackers. While all vulnerabilities in the …

Polyscope: Multi-policy access control analysis to triage android scoped storage

YT Lee, H Chen, W Enck, H Vijayakumar… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Android's filesystem access control is its foundation for system integrity. It combines
mandatory (eg, SELinux) and discretionary (eg, Unix permissions) access control with other …

{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems

YT Lee, W Enck, H Chen, H Vijayakumar, N Li… - 30th USENIX Security …, 2021 - usenix.org
Android's filesystem access control provides a foundation for system integrity. It combines
mandatory (eg, SEAndroid) and discretionary (eg, Unix permissions) access control …