Security of IoT systems: Design challenges and opportunities

T Xu, JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014 - ieeexplore.ieee.org
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

The impact of vendor customizations on android security

L Wu, M Grace, Y Zhou, C Wu, X Jiang - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
The smartphone market has grown explosively in recent years, as more and more
consumers are attracted to the sensor-studded multipurpose devices. Android is particularly …

Protecting data on smartphones and tablets from memory attacks

P Colp, J Zhang, J Gleeson, S Suneja… - Proceedings of the …, 2015 - dl.acm.org
Smartphones and tablets are easily lost or stolen. This makes them susceptible to an
inexpensive class of memory attacks, such as cold-boot attacks, using a bus monitor to …

HideM: Protecting the contents of userspace memory in the face of disclosure vulnerabilities

J Gionta, W Enck, P Ning - Proceedings of the 5th ACM Conference on …, 2015 - dl.acm.org
Memory disclosure vulnerabilities have become a common component for enabling reliable
exploitation of systems by leaking the contents of executable data. Previous research …

Efficiently, effectively detecting mobile app bugs with appdoctor

G Hu, X Yuan, Y Tang, J Yang - … of the Ninth European Conference on …, 2014 - dl.acm.org
Mobile apps bring unprecedented levels of convenience, yet they are often buggy, and their
bugs offset the convenience the apps bring. A key reason for buggy apps is that they must …

Preventing accidental data disclosure in modern operating systems

A Nadkarni, W Enck - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
Modern OSes such as Android, iOS, and Windows 8 have changed the way consumers
interact with computing devices. Tasks are often completed by stringing together a collection …

[PDF][PDF] AirBag: Boosting Smartphone Resistance to Malware Infection.

C Wu, Y Zhou, K Patel, Z Liang, X Jiang - NDSS, 2014 - comp.nus.edu.sg
Recent years have experienced explosive growth of smartphone sales. Inevitably, the rise in
the popularity of smartphones also makes them an attractive target for attacks. In light of …

DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability

M Zheng, M Sun, JCS Lui - 2014 international wireless …, 2014 - ieeexplore.ieee.org
Android, being an open source smartphone operating system, enjoys a large community of
developers who create new mobile services and applications. However, it also attracts …