Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
We present a new approach to static analysis for security vetting of Android apps and a
general framework called Amandroid. Amandroid determines points-to information for all …
general framework called Amandroid. Amandroid determines points-to information for all …
[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …
developers can write apps for IoT platforms using programming frameworks. Like other …
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant {APIs} in {WeChat}
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …
Identity confusion in {WebView-based} mobile app-in-app ecosystems
Mobile applications (apps) often delegate their own functions to other parties, which makes
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …
Cross miniapp request forgery: Root causes, attacks, and vulnerability detection
A miniapp is a full-fledged app that is executed inside a mobile super app such as WeChat
or SnapChat. Being mini by nature, it often has to communicate with other miniapps to …
or SnapChat. Being mini by nature, it often has to communicate with other miniapps to …
Oauth demystified for mobile application developers
OAuth has become a highly influential protocol due to its swift and wide adoption in the
industry. The initial objective of the protocol was specific: it serves the authorization needs …
industry. The initial objective of the protocol was specific: it serves the authorization needs …
A stitch in time: Supporting android developers in writingsecure code
Despite security advice in the official documentation and an extensive body of security
research about vulnerabilities and exploits, many developers still fail to write secure Android …
research about vulnerabilities and exploits, many developers still fail to write secure Android …
Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …