A comprehensive analysis of the android permissions system
IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
Android is one of the most essential and highly used operating systems. Android
permissions system is a core security component that offers an access-control mechanism to …
permissions system is a core security component that offers an access-control mechanism to …
On combining static, dynamic and interactive analysis security testing tools to improve owasp top ten security vulnerability detection in web applications
F Mateo Tudela, JR Bermejo Higuera… - Applied Sciences, 2020 - mdpi.com
Featured Application This document provides a complete comparative study of how different
types of security analysis tools,(static, interactive and dynamic) can combine to obtain the …
types of security analysis tools,(static, interactive and dynamic) can combine to obtain the …
Mobile Device Security Evaluation using Reverse TCP Method
I Riadi, D Aprilliansyah - Kinetik: Game Technology, Information …, 2022 - kinetik.umm.ac.id
Security evaluation on Android devices is critical so that users of the operating system are
protected from malware attacks such as remote access trojans that can steal users' …
protected from malware attacks such as remote access trojans that can steal users' …
A conflicts' classification for IoT-based services: a comparative survey
Abstract Recently, Internet of Things (IoT)-based systems, especially automation systems,
have become an indispensable part of modern-day lives to support the controlling of the …
have become an indispensable part of modern-day lives to support the controlling of the …
A formal method for description and decision of android apps behavior based on process algebra
D Liang, L Shen, Z Chen, C Ma, J Feng - IEEE Access, 2022 - ieeexplore.ieee.org
Android is the most popular mobile platform, and it has become a primary malware target.
Existing behavior-based Android malware detection methods suffer from false positive and …
Existing behavior-based Android malware detection methods suffer from false positive and …
Formal verification of hardware components in critical systems
Hardware components, such as memory and arithmetic units, are integral part of every
computer‐controlled system, for example, Unmanned Aerial Vehicles (UAVs). The …
computer‐controlled system, for example, Unmanned Aerial Vehicles (UAVs). The …
Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications
Today, Android accounts for more than 80% of the global market share. Such a high rate
makes Android applications an important topic that raises serious questions about its …
makes Android applications an important topic that raises serious questions about its …
Proving Reliability of Image Processing Techniques in Digital Forensics Applications
Binary images have found its place in many applications, such as digital forensics involving
legal documents, authentication of images, digital books, contracts, and text recognition …
legal documents, authentication of images, digital books, contracts, and text recognition …
Information flow based defensive chain for data leakage detection and prevention: a survey
Mobile and IoT applications have greatly enriched our daily life by providing convenient and
intelligent services. However, these smart applications have been a prime target of …
intelligent services. However, these smart applications have been a prime target of …
-Smali: An Executable Semantics for Program Verification of Reversed Android Applications
One of the main weaknesses threatening smartphone security is the abysmal lack of tools
and environments that allow formal verification of application actions, thus early detection of …
and environments that allow formal verification of application actions, thus early detection of …