A survey on various threats and current state of security in android platform

P Bhat, K Dutta - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …

A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices

M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …

Context aware dynamic permission model: a retrospect of privacy and security in android system

S Kumar, R Shanker, S Verma - 2018 international conference …, 2018 - ieeexplore.ieee.org
Android security has been a topic of concern lately in both academic and industrial research
because of various occurrence of privacy leaks and security breach on these devices. The …

[PDF][PDF] Instaguard: Instantly deployable hot-patches for vulnerable system programs on android

Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar… - 2018 Network and …, 2018 - par.nsf.gov
Hot-patches, easier to develop and faster to deploy than permanent patches, are used to
timely (and temporarily) block exploits of newly discovered vulnerabilities while permanent …

Cybersecurity: A survey of vulnerability analysis and attack graphs

R Ait Maalem Lahcen, R Mohapatra… - … and Computing: ICMC …, 2018 - Springer
The network infrastructure is the most critical technical asset of any organization. This
network architecture must be useful, efficient, and secure. However, their cybersecurity …

Identifying and evading android sandbox through usage-profile based fingerprints

V Costamagna, C Zheng, H Huang - … of the first workshop on radical and …, 2018 - dl.acm.org
Android sandbox is built either on the Android emulator or the real device with a hooking
framework. Fingerprints of the Android sandbox could be used to evade the dynamic …

Toward smarter vulnerability discovery using machine learning

G Grieco, A Dinaburg - Proceedings of the 11th ACM Workshop on …, 2018 - dl.acm.org
A Cyber Reasoning System (CRS) is designed to automatically find and exploit software
vulnerabilities in complex software. To be effective, CRSs integrate multiple vulnerability …

A taxonomy on recent mobile malware: Features, analysis methods, and detection techniques

H Alimardani, M Nazeh - … of the 2018 International Conference on E …, 2018 - dl.acm.org
Smartphones, tablets, and other mobile devices have quickly become ubiquitous due to their
highly personal and powerful attributes. Android has been the most popular mobile …

[PDF][PDF] 人工智能对工业4.0 关键技术引领探讨

陈巍 - 现代工业经济和信息化, 2018 - researchgate.net
人工智能对工业4.0 关键技术引领探讨 Page 1 DOI:10.16525/j.cnki.14- 1362/n.2018.02.02 总第
158 期 2018 年第2 期 Total of 158 No.2,2018 理论研究 收稿日期:2018- 01- 15 作者简介:陈巍 …

[PDF][PDF] W-shield: protection against cryptocurrency wallet credential stealing

A Nakamoto - Workshop on Security and Privacy in E-Commerce, 2018 - researchgate.net
The birth of Bitcoin (1) is considered as a radical development in money and currency, being
the first example of a decentralized digital asset which simultaneously has no backing or …