Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

The dark side (-channel) of mobile devices: A survey on network traffic analysis

M Conti, QQ Li, A Maragno… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
In recent years, mobile devices (eg, smartphones and tablets) have met an increasing
commercial success and have become a fundamental element of the everyday life for …

Lumus: Dynamically Uncovering Evasive Android Applications

V Afonso, A Kalysch, T Müller, D Oliveira… - … Conference, ISC 2018 …, 2018 - Springer
Dynamic analysis of Android malware suffers from techniques that identify the analysis
environment and prevent the malicious behavior from being observed. While there are many …

Organic phototransistors with chemically doped conjugated polymer interlayers for visible and near infrared light detection

C Lee, H Han, M Song, J Seo, H Kim… - IEEE Journal of …, 2018 - ieeexplore.ieee.org
Organic phototransistors were fabricated by inserting the patterned layers of a chemically
doped conjugated polymer, poly (3, 4-ethylenedioxythiophene)-poly (styrenesulfonate) …

Empirical evaluation of a system call-based android malware detector

P Vinod, P Viswalakshmi - Arabian Journal for Science and Engineering, 2018 - Springer
The extensive use of smartphones and increased popularity of Android operating system
have proliferated in malware attacks. In order to overcome these malicious attacks …

A network-based framework for mobile threat detection

S Kumar, A Viinikainen… - 2018 1st international …, 2018 - ieeexplore.ieee.org
Mobile malware attacks increased three folds in the past few years and continued to expand
with the growing number of mobile users. Adversary uses a variety of evasion techniques to …

[PDF][PDF] 移动设备网络流量分析技术综述

徐明, 杨雪, 章坚武 - 电信科学, 2018 - seclab.hdu.edu.cn
移动设备在人们的日常生活中不可或缺, 分析移动设备产生的网络流量能够为网络管理,
隐私保护等活动提供有价值的信息. 为深入了解流量分析在移动设备领域的发展现状及趋势 …

Introspection for ARM TrustZone with the ITZ Library

M Guerra, B Taubmann, HP Reiser… - … on Software Quality …, 2018 - ieeexplore.ieee.org
TrustZone is an extension of the ARM architecture that allows software executed in ARM
processors to be split in two environments: the normal world that runs a common operating …

[图书][B] Efficient permission-aware analysis of android apps

A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …

Mobile device security with ARM TrustZone

SD Yalew - 2018 - diva-portal.org
Mobile devices such as smartphones are becoming the majority of computing devices due to
their evolving capabilities. Currently, service providers such as financial and healthcare …