{6thSense}: A context-aware sensor-based attack detector for smart devices

AK Sikder, H Aksu, AS Uluagac - 26th USENIX Security Symposium …, 2017 - usenix.org
Sensors (eg, light, gyroscope, accelerometer) and sensing enabled applications on a smart
device make the applications more user-friendly and efficient. However, the current …

A context-aware framework for detecting sensor-based threats on smart devices

AK Sikder, H Aksu, AS Uluagac - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
Sensors (eg, light, gyroscope, and accelerometer) and sensing-enabled applications on a
smart device make the applications more user-friendly and efficient. However, the current …

Aegis: A context-aware security framework for smart home systems

AK Sikder, L Babun, H Aksu, AS Uluagac - Proceedings of the 35th …, 2019 - dl.acm.org
Our everyday lives are expanding fast with the introduction of new Smart Home Systems
(SHSs). Today, a myriad of SHS devices and applications are widely available to users and …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Semadroid: A privacy-aware sensor management framework for smartphones

Z Xu, S Zhu - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
While mobile sensing applications are booming, the sensor management mechanisms in
current smartphone operating systems are left behind--they are incomprehensive and …

A survey on sensor-based threats to internet-of-things (iot) devices and applications

AK Sikder, G Petracca, H Aksu, T Jaeger… - arXiv preprint arXiv …, 2018 - arxiv.org
The concept of Internet of Things (IoT) has become more popular in the modern era of
technology than ever before. From small household devices to large industrial machines, the …

A survey on smartphones security: software vulnerabilities, malware, and attacks

MT Ahvanooey, Q Li, M Rabbani, AR Rajput - arXiv preprint arXiv …, 2020 - arxiv.org
Nowadays, the usage of smartphones and their applications have become rapidly
increasing popular in people's daily life. Over the last decade, availability of mobile money …

[PDF][PDF] Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps

DSJSG Greenwood, ZLL Khan - Network and Distributed System …, 2014 - lilicoding.github.io
Many Android apps use SSL/TLS to transmit sensitive information securely. However,
developers often provide their own implementation of the standard SSL/TLS certificate …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Statically discovering high-order taint style vulnerabilities in os kernels

H Zhang, W Chen, Y Hao, G Li, Y Zhai, X Zou… - Proceedings of the 2021 …, 2021 - dl.acm.org
Static analysis is known to yield numerous false alarms when used in bug finding, especially
for complex vulnerabilities in large code bases like the Linux kernel. One important class of …