Security smells in android

M Ghafari, P Gadient… - 2017 IEEE 17th …, 2017 - ieeexplore.ieee.org
The ubiquity of smartphones, and their very broad capabilities and usage, make the security
of these devices tremendously important. Unfortunately, despite all progress in security and …

Truz-view: Developing trustzone user interface for mobile os using delegation integration model

K Ying, P Thavai, W Du - Proceedings of the Ninth ACM Conference on …, 2019 - dl.acm.org
When OS and hypervisor are compromised, mobile devices currently provide a hardware
protected mode called Trusted Execution Environment (TEE) to guarantee the confidentiality …

[PDF][PDF] Anti-plugin: Don't let your app play as an android plugin

T Luo, C Zheng, Z Xu, X Ouyang - Proceedings of Blackhat Asia, 2017 - blackhat.com
The Android plugin technology is an innovative applicationlevel virtualization framework that
allows a mobile application to dynamically load and launch another app without installing …

[PDF][PDF] Security in Android applications

P Gadient, O Nierstrasz, M Ghafari - University of Bern: Bern …, 2017 - scg.unibe.ch
The ubiquity of smartphones, and their very broad capabilities and usage, make the security
of these devices tremendously important. Unfortunately, despite all progress in security and …

Visual analysis of android malware behavior profile based on: a pruned lightweight app call graph

Y Zhang, G Peng, L Yang, Y Wang, M Tian, J Hu… - … Conference on Security …, 2017 - Springer
In recent years, there is a sharp increasing in the number of malicious APPs on the Android
platform, so how to identify new type of Android malware and its malicious behaviors has …

A novel hotfix scheme for system vulnerability based on the android application layer

W Zhang, N Su, S Niu, H Li… - Chinese Journal of …, 2019 - Wiley Online Library
At present, fixing Android system vulnerabilities relies on official Android support and
various equipment manufacturers, and it is mainly implemented by system upgrades. This …

[图书][B] Applying deep learning techniques to the analysis of Android APKs

RA Nix - 2017 - search.proquest.com
Malware targeting mobile devices is a pervasive problem in modern life and as such tools to
detect and classify malware are of great value. This paper seeks to demonstrate the …

Integrating TrustZone Protection with Communication Paths for Mobile Operating System

K Ying - 2019 - search.proquest.com
Nowadays, users perform various essential activities through their smartphones, including
mobile payment and financial transaction. Therefore, users' sensitive data processed by …

A feasibility research on waveform recognition algorithm based on geometric characteristics

L Feng, C Meili - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
ECG analysis diagnosis system mainly consists of two phases: waveform recognition and
intelligent diagnostics. In practical applications, the ECG waveform recognition is the key to …

[图书][B] Mobile Privacy Leakage Detection and Prevention: From Technical Solutions to User Experience

S Alqahtani - 2019 - search.proquest.com
Mobile apps feed on variety of users' information to provide great services. Some of the
features require more sensitive details such as contact list to connect with friends or a …