Ai-driven cybersecurity: an overview, security intelligence modeling and research directions

IH Sarker, MH Furhad, R Nowrozy - SN Computer Science, 2021 - Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …

Cybersecurity data science: an overview from machine learning perspective

IH Sarker, ASM Kayes, S Badsha, H Alqahtani… - Journal of Big …, 2020 - Springer
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …

Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Comparative analysis of Android and iOS from security viewpoint

S Garg, N Baliyan - Computer Science Review, 2021 - Elsevier
Smartphone usage has increased exponentially in the recent years. Android and iOS are the
most popular smartphone platforms, while the ease of use along with the computational …

Chex: statically vetting android apps for component hijacking vulnerabilities

L Lu, Z Li, Z Wu, W Lee, G Jiang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …

Why Eve and Mallory love Android: An analysis of Android SSL (in) security

S Fahl, M Harbach, T Muders, L Baumgärtner… - Proceedings of the …, 2012 - dl.acm.org
Many Android apps have a legitimate need to communicate over the Internet and are then
responsible for protecting potentially sensitive data during transit. This paper seeks to better …

PIndroid: A novel Android malware detection system using ensemble learning methods

F Idrees, M Rajarajan, M Conti, TM Chen… - Computers & …, 2017 - Elsevier
The extensive use of smartphones has been a major driving force behind a drastic increase
of malware attacks. Covert techniques used by the malware make them hard to detect with …

Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis

D Octeau, P McDaniel, S Jha, A Bartel… - 22nd USENIX Security …, 2013 - usenix.org
Many threats present in smartphones are the result of interactions between application
components, not just artifacts of single components. However, current techniques for …

Demystifying exploitable bugs in smart contracts

Z Zhang, B Zhang, W Xu, Z Lin - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Exploitable bugs in smart contracts have caused significant monetary loss. Despite the
substantial advances in smart contract bug finding, exploitable bugs and real-world attacks …

[PDF][PDF] Systematic detection of capability leaks in stock android smartphones.

MC Grace, Y Zhou, Z Wang, X Jiang - NDSS, 2012 - dl.packetstormsecurity.net
Recent years have witnessed a meteoric increase in the adoption of smartphones. To
manage information and features on such phones, Android provides a permission-based …