Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Peeking behind the curtains of serverless platforms

L Wang, M Li, Y Zhang, T Ristenpart… - 2018 USENIX annual …, 2018 - usenix.org
Serverless computing is an emerging paradigm in which an application's resource
provisioning and scaling are managed by third-party services. Examples include AWS …

[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.

YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes… - ndss, 2017 - cs.uwaterloo.ca
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …

An improved P2P file system scheme based on IPFS and Blockchain

Y Chen, H Li, K Li, J Zhang - … Conference on Big Data (Big Data …, 2017 - ieeexplore.ieee.org
IPFS [1] is a peer-to-peer version controlled filesystem that synthesizes learnings from many
previous successful systems. IPFS combines a distributed Hash table, an incentivized block …

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

N Zhang, X Mi, X Feng, XF Wang… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Virtual personal assistants (VPA)(eg, Amazon Alexa and Google Assistant) today mostly rely
on the voice channel to communicate with their users, which however is known to be …

Rendered insecure: Gpu side channel attacks are practical

H Naghibijouybari, A Neupane, Z Qian… - Proceedings of the …, 2018 - dl.acm.org
Graphics Processing Units (GPUs) are commonly integrated with computing devices to
enhance the performance and capabilities of graphical workloads. In addition, they are …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

What the app is that? deception and countermeasures in the android user interface

A Bianchi, J Corbetta, L Invernizzi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Mobile applications are part of the everyday lives of billions of people, who often trust them
with sensitive information. These users identify the currently focused app solely by its visual …

Conceptual framework for the security of mobile health applications on android platform

M Hussain, AA Zaidan, BB Zidan, S Iqbal… - Telematics and …, 2018 - Elsevier
Mobile Health (mHealth) applications are readily accessible to the average user of mobile
devices, and despite the potential of mHealth applications to improve the availability …