Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of people. Thus, researchers have applied automated bug finding techniques to improve their …
C Wang, Y Zhang, Z Lin - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Mobile applications, particularly those from social media platforms such as WeChat and TikTok, are evolving into" super apps" that offer a wide range of services such as instant …
Native code is now commonplace within Android app packages where it co-exists and interacts with Dex bytecode through the Java Native Interface to deliver rich app …
Next-generation wireless networks (NGWN) aim to support diversified smart applications that require frequent data exchanges and collaborative data processing among multiple …
G Duan, H Liu, M Cai, J Sun, H Chen - Computers & Security, 2024 - Elsevier
Abstract System call sequences representing the runtime behavior of an application is particularly useful for anomaly detection in mobile applications. However, one of the main …
One prominent tactic used to keep malicious behavior from being detected during dynamic test campaigns is logic bombs, where malicious operations are triggered only when specific …
J Samhi, M Kober, AK Kabore, S Arzt… - … on Software Analysis …, 2023 - ieeexplore.ieee.org
Apps on mobile phones manipulate all sorts of data, including sensitive data, leading to privacy-related concerns. Recent regulations like the European GDPR provide rules for the …
W Huang, W Tang, K Zhang, H Zhu… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Enormous mobile applications (apps) now support voice functionality for convenient user- device interaction. However, these voice-enabled apps may spitefully invoke microphone to …
The manifest file of an Android app is crucial for app security as it declares sensitive app configurations, such as access permissions required to access app components …