A comprehensive analysis of the android permissions system

IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
Android is one of the most essential and highly used operating systems. Android
permissions system is a core security component that offers an access-control mechanism to …

On combining static, dynamic and interactive analysis security testing tools to improve owasp top ten security vulnerability detection in web applications

F Mateo Tudela, JR Bermejo Higuera… - Applied Sciences, 2020 - mdpi.com
Featured Application This document provides a complete comparative study of how different
types of security analysis tools,(static, interactive and dynamic) can combine to obtain the …

Mobile Device Security Evaluation using Reverse TCP Method

I Riadi, D Aprilliansyah - Kinetik: Game Technology, Information …, 2022 - kinetik.umm.ac.id
Security evaluation on Android devices is critical so that users of the operating system are
protected from malware attacks such as remote access trojans that can steal users' …

A conflicts' classification for IoT-based services: a comparative survey

H Ibrhim, H Hassan, E Nabil - PeerJ Computer Science, 2021 - peerj.com
Abstract Recently, Internet of Things (IoT)-based systems, especially automation systems,
have become an indispensable part of modern-day lives to support the controlling of the …

A formal method for description and decision of android apps behavior based on process algebra

D Liang, L Shen, Z Chen, C Ma, J Feng - IEEE Access, 2022 - ieeexplore.ieee.org
Android is the most popular mobile platform, and it has become a primary malware target.
Existing behavior-based Android malware detection methods suffer from false positive and …

Formal verification of hardware components in critical systems

W Khan, M Kamran, SR Naqvi, FA Khan… - Wireless …, 2020 - Wiley Online Library
Hardware components, such as memory and arithmetic units, are integral part of every
computer‐controlled system, for example, Unmanned Aerial Vehicles (UAVs). The …

Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications

M Ziadia, J Fattahi, M Mejri, E Pricop - Information, 2020 - mdpi.com
Today, Android accounts for more than 80% of the global market share. Such a high rate
makes Android applications an important topic that raises serious questions about its …

Proving Reliability of Image Processing Techniques in Digital Forensics Applications

S Iqbal, W Khan, A Alothaim, A Qamar… - Security and …, 2022 - Wiley Online Library
Binary images have found its place in many applications, such as digital forensics involving
legal documents, authentication of images, digital books, contracts, and text recognition …

Information flow based defensive chain for data leakage detection and prevention: a survey

N Xi, C Chen, J Zhang, C Sun, S Liu, P Feng… - arXiv preprint arXiv …, 2021 - arxiv.org
Mobile and IoT applications have greatly enriched our daily life by providing convenient and
intelligent services. However, these smart applications have been a prime target of …

-Smali: An Executable Semantics for Program Verification of Reversed Android Applications

M Ziadia, M Mejri, J Fattahi - … Symposium on Foundations and Practice of …, 2021 - Springer
One of the main weaknesses threatening smartphone security is the abysmal lack of tools
and environments that allow formal verification of application actions, thus early detection of …