Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps

F Wei, S Roy, X Ou, Robby - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
We present a new approach to static analysis for security vetting of Android apps and a
general framework called Amandroid. Amandroid determines points-to information for all …

[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.

YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes… - ndss, 2017 - cs.uwaterloo.ca
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …

One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant {APIs} in {WeChat}

C Wang, Y Zhang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …

Identity confusion in {WebView-based} mobile app-in-app ecosystems

L Zhang, Z Zhang, A Liu, Y Cao, X Zhang… - 31st USENIX Security …, 2022 - usenix.org
Mobile applications (apps) often delegate their own functions to other parties, which makes
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …

Cross miniapp request forgery: Root causes, attacks, and vulnerability detection

Y Yang, Y Zhang, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
A miniapp is a full-fledged app that is executed inside a mobile super app such as WeChat
or SnapChat. Being mini by nature, it often has to communicate with other miniapps to …

Oauth demystified for mobile application developers

EY Chen, Y Pei, S Chen, Y Tian, R Kotcher… - Proceedings of the 2014 …, 2014 - dl.acm.org
OAuth has become a highly influential protocol due to its swift and wide adoption in the
industry. The initial objective of the protocol was specific: it serves the authorization needs …

A stitch in time: Supporting android developers in writingsecure code

DC Nguyen, D Wermke, Y Acar, M Backes… - Proceedings of the …, 2017 - dl.acm.org
Despite security advice in the official documentation and an extensive body of security
research about vulnerabilities and exploits, many developers still fail to write secure Android …

Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation

X Jin, X Hu, K Ying, W Du, H Yin, GN Peri - Proceedings of the 2014 …, 2014 - dl.acm.org
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …