IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems

A Al Farooq, E Al-Shaer, T Moyer… - 2019 IFIP/IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has become a common paradigm for different domains such as
health care, transportation infrastructure, smart homes, smart shopping, and e-commerce …

Formal analysis of language-based android security using theorem proving approach

W Khan, M Kamran, A Ahmad, FA Khan… - IEEE Access, 2019 - ieeexplore.ieee.org
Mobile devices are an indispensable part of modern-day lives to support portable
computations and context-aware communication. Android applications within a mobile …

Competitive compliance with blockchain

S Wohlgemuth, K Umezawa, Y Mishina… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Authentication is essential for sharing information in IoT and its secondary use with AI-
capable machines. The aim is to support humans in optimizing risk of supply chains for …

Safe and efficient implementation of a security system on ARM using intra-level privilege separation

D Kwon, H Yi, Y Cho, Y Paek - ACM Transactions on Privacy and …, 2019 - dl.acm.org
Security monitoring has long been considered as a fundamental mechanism to mitigate the
damage of a security attack. Recently, intra-level security systems have been proposed that …

SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode

E Geraldo, JC Seco - arXiv preprint arXiv:1908.10041, 2019 - arxiv.org
Software testing is the most commonly used technique in the industry to certify the
correctness of software systems. This includes security properties like access control and …

[引用][C] COMP9243—Lecture 11 (19T3)