Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

Sensitive information tracking in commodity {IoT}

ZB Celik, L Babun, AK Sikder, H Aksu, G Tan… - 27th USENIX Security …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital connectivity has had profound effects on society …

Permission-combination-based scheme for android mobile malware detection

S Liang, X Du - 2014 IEEE international conference on …, 2014 - ieeexplore.ieee.org
With the increase use of Android mobile phones, more Android malwares are being
developed. Android malware detection becomes a crucial task. In this paper, we present a …

Mobile security testing approaches and challenges

Y Wang, Y Alshboul - 2015 First Conference on Mobile and …, 2015 - ieeexplore.ieee.org
Mobile devices such as smartphones and tablets are widely used for personal and business
purposes. A mobile device may carry sensitive data and becomes an easy target for cyber …

Real-time analysis of privacy-(un) aware IoT applications

L Babun, ZB Celik, P McDaniel, AS Uluagac - arXiv preprint arXiv …, 2019 - arxiv.org
Users trust IoT apps to control and automate their smart devices. These apps necessarily
have access to sensitive data to implement their functionality. However, users lack visibility …

PAGURUS: Low-overhead dynamic information flow tracking on loosely coupled accelerators

L Piccolboni, G Di Guglielmo… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Software-based attacks exploit bugs or vulnerabilities to get unauthorized access or leak
confidential information. Dynamic information flow tracking (DIFT) is a security technique to …

Compiler-instrumented, Dynamic {Secret-Redaction} of Legacy Processes for Attacker Deception

F Araujo, W Kevin - … USENIX Security Symposium (USENIX Security 15 …, 2015 - usenix.org
An enhanced dynamic taint-tracking semantics is presented and implemented, facilitating
fast and precise runtime secret redaction from legacy processes, such as those compiled …

[PDF][PDF] Analyzing end-users' knowledge and feelings surrounding smartphone security and privacy

L Kraus, T Fiebig, V Miruchna, S Möller, A Shabtai - S&P. IEEE, 2015 - ieee-security.org
Along with the significant growth in the popularity of smartphones and the number of
available mobile applications, the amount of threats that harm users or compromise their …

Ddift: Decentralized dynamic information flow tracking for iot privacy and security

N Sapountzis, R Sun, D Oliveira - Workshop on Decentralized IoT …, 2019 - par.nsf.gov
By 2018, it is no secret to the global networking community: Internet of Things (IoT) devices,
usually controlled by IoT applications and applets, have dominated human lives. It has been …

FineDIFT: Fine-grained dynamic information flow tracking for data-flow integrity using coprocessor

K Chen, O Arias, Q Deng, D Oliveira… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Information Flow Tracking (DIFT) is a technique that facilitates run-time data-flow
analysis on a running process, allowing a system to overcome the limitations of finding data …