Sensitive personal data are created in many application domains, and there is now an increasing demand to share, integrate, and link such data within and across organisations in …
S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for many routine tasks like shopping, paying bills, transferring money, instant messaging …
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and vulnerable certificate verification, seriously threaten software security. The vision of …
H Chi, Q Zeng, X Du, J Yu - 2020 50th Annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
Internet of Thing platforms prosper home automation applications (apps). Prior research concerns intra-app security. Our work reveals that automation apps, even secured …
In recent years, researchers have developed a number of tools to conduct taint analysis of Android applications. While all the respective papers aim at providing a thorough empirical …
S Afrose, Y Xiao, S Rahaman… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several studies showed that misuses of cryptographic APIs are common in real-world code (eg, Apache projects and Android apps). There exist several open-sourced and commercial …
During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification …
Smart home devices provide the convenience of remotely control-ling and automating home appliances. The most advanced smart home environments allow developers to write apps to …
The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is …