FH da Costa, I Medeiros, T Menezes, JV da Silva… - Journal of Systems and …, 2022 - Elsevier
The popularization of the Android platform and the growing number of Android applications (apps) that manage sensitive data turned the Android ecosystem into an attractive target for …
M O'Neill, S Heidbrink, S Ruoti, J Whitehead… - 26th USENIX Security …, 2017 - usenix.org
The current state of certificate-based authentication is messy, with broken authentication in applications and proxies, along with serious flaws in the CA system. To solve these …
L Koycheva, A VandenBroek - Practicing Anthropology, 2024 - Taylor & Francis
We introduce this collection on" sandbox innovation," where innovative practices are separated and nurtured within a confined, risk-controlled environment, akin to a child's …
T Rice, G Seppala, TW Edgar, D Cain… - Proceedings of the …, 2019 - dl.acm.org
Embedded field devices that sense and control physical processes in critical infrastructure are soft targets for cyber-attack because they lack the fundamental features for existing cyber …
Sandboxing mechanisms allow developers to limit how much access applications have to resources, following the least-privilege principle. However, it's not clear how much and in …
A Bierska, B Buhnova, H Bangui - FedCSIS (Position Papers), 2022 - annals-csis.org
With the advancement of digitalization, critical information infrastructures, such as intelligent energy distribution, transportation, or healthcare, have opened themselves towards …
In 2013, a group of entrepreneurs, investors, evangelists, and enthusiasts gathered at the Hilton Slussen in Stockholm and voted to create the hashtag# SthlmTech to describe the …
M Blochberger, T Petersen, H Federrath - 2019 - dl.gi.de
Developers struggle to integrate cryptographic functionality into their applications. Many mistakes have been identified by related work and tools have been developed for detecting …
OC Chueca - Revista de Trabajo y Seguridad Social. CEF, 2018 - revistas.cef.udima.es
El «propietarismo» ha venido siendo la visión imperante que los tribunales españoles han adoptado para el análisis jurídico-laboral de las nuevas tecnologías, pero la utilización de …