Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
[PDF][PDF] JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Today, more and more web browsers and extensions provide anonymity features to hide
user details. Primarily used to evade tracking by websites and advertisements, these …
user details. Primarily used to evade tracking by websites and advertisements, these …
Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing
The recent rise of Smart IoT devices has opened new doors for cyber criminals to achieve
damages unique to the ecosystem. SmartTVs, the most widely adopted home-based IoT …
damages unique to the ecosystem. SmartTVs, the most widely adopted home-based IoT …
[PDF][PDF] Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.
Ever since its genesis, Android has enabled apps to access data and services on mobile
devices. This however involves a wide variety of user-unresettable identifiers (UUIs), eg, the …
devices. This however involves a wide variety of user-unresettable identifiers (UUIs), eg, the …
DNN model architecture fingerprinting attack on CPU-GPU edge devices
Embedded systems for edge computing are getting more powerful, and some are equipped
with a GPU to enable on-device deep neural network (DNN) learning tasks such as image …
with a GPU to enable on-device deep neural network (DNN) learning tasks such as image …
Magneticspy: Exploiting magnetometer in mobile devices for website and application fingerprinting
Recent studies have shown that aggregate CPU usage and power consumption traces on
smartphones can leak information about applications running on the system or websites …
smartphones can leak information about applications running on the system or websites …
Magspy: Revealing user privacy leakage via magnetometer on mobile devices
Various characteristics of mobile applications (apps) and associated in-app services can
reveal potentially-sensitive user information; however, privacy concerns have prompted third …
reveal potentially-sensitive user information; however, privacy concerns have prompted third …
Hidden in plain sight: Exploring privacy risks of mobile augmented reality applications
Mobile augmented reality systems are becoming increasingly common and powerful, with
applications in such domains as healthcare, manufacturing, education, and more. This rise …
applications in such domains as healthcare, manufacturing, education, and more. This rise …
See no evil: phishing for permissions with false transparency
Android introduced runtime permissions in order to provide users with more contextual
information to make informed decisions as well as with finer granularity when dealing with …
information to make informed decisions as well as with finer granularity when dealing with …