Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Android system
biblio
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions
Submitted by aekwall on Thu, 05/13/2021 - 10:37am
security
Kernel
Linux
Resiliency
pubcrawl
Metrics
internet
tools
sensors
Scalability
Prototypes
system call
attack surface
Android system
seccomp Mechanism
Shrinking
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Data mining
android encryption
permission mechanism
overprivileged permission detection
frequent item set mining
Droidtector
App protection technology
Android system
smartphone
Metrics
Android applications
Android (operating system)
Cameras
security of data
smart phones
tools
privacy
Google
pubcrawl
Human behavior
Resiliency
privacy leakage
mobile computing
data privacy
encryption
Scalability
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 12:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen