A Study of Application Sandbox Policies in Linux | 0 | 0.34 | 2022 |
Reflections on a Decade of Mobile Security Research | 0 | 0.34 | 2022 |
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations | 1 | 0.43 | 2022 |
Removing the Reliance on Perimeters for Security using Network Views | 0 | 0.34 | 2022 |
FRED: Identifying File Re-Delegation in Android System Services | 0 | 0.34 | 2022 |
ALASTOR: Reconstructing the Provenance of Serverless Intrusions | 0 | 0.34 | 2022 |
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing | 0 | 0.34 | 2021 |
Role-Based Deception in Enterprise Networks | 0 | 0.34 | 2021 |
Hey Alexa, Is This Skill Safe?: Taking A Closer Look At The Alexa Skill Ecosystem | 0 | 0.34 | 2021 |
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems | 0 | 0.34 | 2021 |
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications | 0 | 0.34 | 2020 |
LeakyPick: IoT Audio Spy Detector | 1 | 0.35 | 2020 |
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS | 0 | 0.34 | 2020 |
Analysis of Access Control Enforcement in Android | 0 | 0.34 | 2020 |
Do configuration management tools make systems more secure? - an empirical research plan. | 0 | 0.34 | 2020 |
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. | 1 | 0.36 | 2019 |
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things | 3 | 0.40 | 2019 |
ARF: identifying re-delegation vulnerabilities in Android system services | 1 | 0.36 | 2019 |
Policylint: Investigating Internal Privacy Policy Contradictions On Google Play | 0 | 0.34 | 2019 |
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors | 0 | 0.34 | 2019 |
Selected Papers From the 2018 USENIX Security Symposium. | 0 | 0.34 | 2019 |
Hestia: simple least privilege network policies for smart homes | 0 | 0.34 | 2019 |
HomeSnitch: behavior transparency and control for smart home IoT devices | 9 | 0.54 | 2019 |
iOracle: Automated Evaluation of Access Control Policies in iOS. | 1 | 0.36 | 2018 |
PivotWall: SDN-Based Information Flow Control | 2 | 0.37 | 2018 |
Policy by Example: An Approach for Security Policy Specification. | 0 | 0.34 | 2017 |
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. | 2 | 0.41 | 2017 |
UiRef: analysis of sensitive user inputs in Android applications. | 9 | 0.45 | 2017 |
A Study of Security Vulnerabilities on Docker Hub. | 17 | 1.28 | 2017 |
Phonion: Practical Protection of Metadata in Telephony Networks. | 1 | 0.35 | 2017 |
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. | 4 | 0.44 | 2017 |
*droid: Assessment and Evaluation of Android Application Analysis Tools | 8 | 0.50 | 2016 |
Practical Difc Enforcement On Android | 10 | 0.49 | 2016 |
SandBlaster: Reversing the Apple Sandbox. | 2 | 0.40 | 2016 |
Text analytics for security: tutorial. | 0 | 0.34 | 2016 |
A Study of Security Isolation Techniques. | 0 | 0.34 | 2016 |
A Study of Grayware on Google Play | 9 | 0.49 | 2016 |
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles. | 5 | 0.71 | 2016 |
Preventing kernel code-reuse attacks through disclosure resistant code diversification. | 0 | 0.34 | 2016 |
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities | 37 | 0.83 | 2015 |
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context | 70 | 1.51 | 2015 |
Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream? | 4 | 0.42 | 2015 |
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning | 16 | 0.64 | 2015 |
SEER: practical memory virus scanning as a service. | 4 | 0.42 | 2014 |
NativeWrap: ad hoc smartphone application creation for end users | 3 | 0.39 | 2014 |
ASM: a programmable interface for extending android security | 42 | 1.16 | 2014 |
Insecure behaviors on mobile devices under stress | 0 | 0.34 | 2014 |
DACSA: a decoupled architecture for cloud security analysis | 3 | 0.44 | 2014 |
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities. | 4 | 0.48 | 2014 |
Modeling and sensing risky user behavior on mobile devices | 0 | 0.34 | 2014 |