Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

N Zhang, X Mi, X Feng, XF Wang… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …

Black-box attacks on sequential recommenders via data-free model extraction

Z Yue, Z He, H Zeng, J McAuley - … of the 15th ACM conference on …, 2021 - dl.acm.org
We investigate whether model extraction can be used to 'steal'the weights of sequential
recommender systems, and the potential threats posed to victims of such attacks. This type …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Cloak and dagger: from two permissions to complete control of the UI feedback loop

Y Fratantonio, C Qian, SP Chung… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
The effectiveness of the Android permission system fundamentally hinges on the user's
correct understanding of the capabilities of the permissions being granted. In this paper, we …

Monet: a user-oriented behavior-based malware variants detection system for android

M Sun, X Li, JCS Lui, RTB Ma… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its
popularity, it attracts many malware attacks. In fact, people have discovered around 1 million …

Privacyasst: Safeguarding user privacy in tool-using large language model agents

X Zhang, H Xu, Z Ba, Z Wang, Y Hong… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Swift advancements in large language model (LLM) technologies lead to widespread
research and applications, particularly in integrating LLMs with auxiliary tools, known as tool …

Aot-attack on things: A security analysis of iot firmware updates

M Ibrahim, A Continella… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
IoT devices implement firmware update mechanisms to fix security issues and deploy new
features. These mechanisms are often triggered and mediated by mobile companion apps …