Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …
based on social engineering to advanced persistent threats. Recent research and …
Compile-time code virtualization for android applications
Infringing intellectual property by reverse analysis is a severe threat to Android applications.
By replacing the program instructions with virtual instructions that an adversary is unfamiliar …
By replacing the program instructions with virtual instructions that an adversary is unfamiliar …
Reducing security risks of suspicious data and codes through a novel dynamic defense model
Z Wu, X Chen, Z Yang, X Du - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A remarkable characteristic of the modern operating system is open, which means that we
can download data or execute codes from any Internet sources whether they are trusted or …
can download data or execute codes from any Internet sources whether they are trusted or …
[PDF][PDF] Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART.
G Na, J Lim, K Kim, JH Yi - J. Internet Serv. Inf. Secur., 2016 - jisis.org
The runtime system for the Android platform has changed to ART. ART differs from
previously used Dalvik in that it is to be a runtime environment for the application's machine …
previously used Dalvik in that it is to be a runtime environment for the application's machine …
CDroid: practically implementation a formal-analyzed CIFC model on Android
Z Wu, X Chen, X Du, Z Yang - Computers & Security, 2018 - Elsevier
Decentralized information flow control (DIFC) operating systems provide mechanisms for
applications to handle the secrecy and integrity of their data by themselves. DIFC adapts to …
applications to handle the secrecy and integrity of their data by themselves. DIFC adapts to …
A virtualization-based solution for protecting Android Bluetooth Low-Energy communications
A VARISCHIO - thesis.unipd.it
Abstract Bluetooth Low Energy (BLE) is a growing wireless technology firstly announced in
1999. It is commonly used in the IoT environment since it permits the transmission of data …
1999. It is commonly used in the IoT environment since it permits the transmission of data …
[PDF][PDF] Academic Curriculum Vitae
SR Alker - 2009 - whitman.edu
Academic Curriculum Vitae Dr. Sharon-Ruth Alker Current Position 2020 to date Chair of
Division II: Humanities and Arts 2018 to Page 1 1 Academic Curriculum Vitae Dr. Sharon-Ruth …
Division II: Humanities and Arts 2018 to Page 1 1 Academic Curriculum Vitae Dr. Sharon-Ruth …