[PDF][PDF] Privacy protection scheme of POI query based on semantic and temporal association

K Zuo, J Zhao, P Hu, P Hu, Z Shen, X Chu - Int. J. Netw. Secur, 2022 - ijns.jalaxy.com.tw
In a digital society, location-based service (LBS) is a necessary function for mobile devices.
However, while enjoying the convenience, users also face the risk of privacy disclosure. A …

Android malware analysis and detection: A systematic review

A Dahiya, S Singh, G Shrivastava - Expert Systems - Wiley Online Library
Android malware has been emerged as a significant threat, which includes exposure of
confidential information, misrepresentation of facts and execution of applications without the …

A taint analysis framework applied to android applications in the packed state

S Bai, L Ma, H Ma, W Liu - China Communications, 2023 - ieeexplore.ieee.org
In recent years, Android applications have caused personal privacy leaks frequently. In
order to analyze the malicious behavior, taint analysis technology can be used to track the …

An Entropy-based Method for Social Apps Privacy Assessment Using the Android Permissions Architecture

A Sandor, E Simion - Advances in Electrical and Computer …, 2022 - search.proquest.com
Android social applications tend to be more and more popular as smartphones became very
important devices for most people. Social applications increase smartphone's functionalities …

Review on the Static Analysis Techniques Used for Privacy Leakage Detection in Android Apps

M Verma, P Nand - … Conference on Advances and Applications of Artificial …, 2022 - Springer
Android app market is growing very fast. Android phone contains a lot of user data and most
of the apps access private data. Intentionally or unintentionally some apps leak the private …

ML-based Privacy Leakage Behavior Detection in Android Apps at Scale

ZL Bu, C Zhao, L Gong, Y Wang… - … , Digital Twin, Privacy …, 2022 - ieeexplore.ieee.org
In recent years, Android application privacy leaking issues frequently occur, with the results
that privacy leakage detection becomes a critical role in app market security review, and …

A review of auxiliary hardware architectures supporting dynamic taint analysis

A Yang, Y Guang, Y Zhao - International Conference on Cloud …, 2022 - spiedigitallibrary.org
Dynamic taint analysis is a widely used information flow analysis method. The software
structure supporting dynamic taint analysis needs running program to monitor the spread of …

Cryptocurrency Security Study based on Static Taint Analysis

A Yang - Highlights in Science, Engineering and Technology, 2023 - drpress.org
Cryptocurrency represented by Bitcoin is a very popular topic in recent years. However, the
prosperity of cryptocurrency drives an increasing number of applications published. Some …

Pemetaan Lokasi Pembuangan Sampah Ilegal di Kota Serang

APR Hikmatullah - 2023 - dspace.uii.ac.id
Persampahan sampah sudah menjadi masalah yang kritis di Indonesia. Banyak Kota besar,
terutama Kota Serang yang tidak lepas dari permasalahan sampah. Sampah yang tidak …