Security and privacy-sensitive smartphone applications use trusted execution environments (TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged …
Malicious software, a threat users face on a daily basis, have evolved from simple bankers based on social engineering to advanced persistent threats. Recent research and …
RS Leon, M Kiperberg, AA Leon Zabag, NJ Zaidenberg - Cybersecurity, 2021 - Springer
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to …
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private …
D Ji, Q Zhang, S Zhao, Z Shi… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
ARM TrustZone technology is widely used to provide Trusted Execution Environments (TEE) for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In …
J Sybrandt, M Shtutman, I Safro - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The first step of many research projects is to define and rank a short list of candidates for study. In the modern rapidity of scientific progress, some turn to automated hypothesis …
The growing popularity of Android and the increasing amount of sensitive data stored in mobile devices have lead to the dissemination of Android ransomware. Ransomware is a …
In less than a decade, mobile apps became an integral part of our lives. In several situations it is important to provide assurance that a mobile app is authentic, ie, that it is indeed the app …
Owing to their mobility, persistent connectivity, and variety of applications, cell phones are now more often used as a primary computing platform than desktop computers and laptops …