Understanding iot security from a market-scale perspective

X Jin, S Manandhar, K Kafle, Z Lin… - Proceedings of the 2022 …, 2022 - dl.acm.org
Consumer IoT products and services are ubiquitous; yet, a proper characterization of
consumer IoT security is infeasible without an understanding of what IoT products are on the …

Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices

N Redini, A Continella, D Das… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …

Uncovering and exploiting hidden apis in mobile super apps

C Wang, Y Zhang, Z Lin - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Mobile applications, particularly those from social media platforms such as WeChat and
TikTok, are evolving into" super apps" that offer a wide range of services such as instant …

Jucify: A step towards android code unification for enhanced static analysis

J Samhi, J Gao, N Daoudi, P Graux, H Hoyez… - Proceedings of the 44th …, 2022 - dl.acm.org
Native code is now commonplace within Android app packages where it co-exists and
interacts with Dex bytecode through the Java Native Interface to deliver rich app …

Data management for future wireless networks: Architecture, privacy preservation, and regulation

XS Shen, C Huang, D Liu, L Xue, W Zhuang… - IEEE …, 2021 - ieeexplore.ieee.org
Next-generation wireless networks (NGWN) aim to support diversified smart applications
that require frequent data exchanges and collaborative data processing among multiple …

MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware

G Duan, H Liu, M Cai, J Sun, H Chen - Computers & Security, 2024 - Elsevier
Abstract System call sequences representing the runtime behavior of an application is
particularly useful for anomaly detection in mobile applications. However, one of the main …

Difuzer: Uncovering suspicious hidden sensitive operations in android apps

J Samhi, L Li, TF Bissyandé, J Klein - Proceedings of the 44th …, 2022 - dl.acm.org
One prominent tactic used to keep malicious behavior from being detected during dynamic
test campaigns is logic bombs, where malicious operations are triggered only when specific …

Negative results of fusing code and documentation for learning to accurately identify sensitive source and sink methods: An application to the android framework for …

J Samhi, M Kober, AK Kabore, S Arzt… - … on Software Analysis …, 2023 - ieeexplore.ieee.org
Apps on mobile phones manipulate all sorts of data, including sensitive data, leading to
privacy-related concerns. Recent regulations like the European GDPR provide rules for the …

Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems

W Huang, W Tang, K Zhang, H Zhu… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Enormous mobile applications (apps) now support voice functionality for convenient user-
device interaction. However, these voice-enabled apps may spitefully invoke microphone to …

Detecting and measuring misconfigured manifests in android apps

Y Yang, M Elsabagh, C Zuo, R Johnson… - Proceedings of the …, 2022 - dl.acm.org
The manifest file of an Android app is crucial for app security as it declares sensitive app
configurations, such as access permissions required to access app components …