Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
android
file
An Architecture Style for Android Security
Submitted by bschmerl on Wed, 05/06/2015 - 10:22am. Contributors:
Bradley Schmerl
Jeffrey Gennari
David Garlan
Architectures
android
Android security
Frameworks
HotSoS 2015
Academia
Poster
Posters
biblio
Some issues regarding operating system security
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Abstracts
android
Android (operating system)
covert channel analysis
Focusing
information security
Laboratories
operating system security
operating systems
secure OS design
security of data
software engineering
Standards development
Windows
biblio
Design and implementation of a mobile VoIP system on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:37pm
Mobility
VoIP service
VoIP
true mid-call mobility
sockets
socket communications
smart phones
signaling procedure
Servers
Protocols
pre-call mobility
Peer-to-peer computing
peer entity
moving users
mobility management (mobile radio)
android
mobile VoIP system
mobile users
IP networks
Internet telephony
in band signaling
graphical user interfaces
encryption
DNS
Cryptography
buffering techniques
ASP technology
Androids
Android devices
Android (operating system)
biblio
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 12:30pm
cryptographic misuse vulnerability model
Vulnerability
static analysis
Runtime
prototype tool crypto misuse analyser
program diagnostics
Modelling Analysis
Humanoid robots
encryption
Cryptography
Analytical models
cryptographic misuse autodetection
Cryptographic Misuse
cryptographic API
CMA
application program interfaces
Androids
Android application
Android (operating system)
android
biblio
Comparative mobile platforms security solutions
Submitted by BrandonB on Mon, 05/04/2015 - 12:28pm
mobile computing paradigm
Windows Phone
smart phones
smart phone
sensitive information
security of data
QNX
private information
mobile platform security solution
android
mobile computing
Mobile communication
Kernel
ios
encryption
comparative mobile platforms
BlackBerry
Androids
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 12:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
A new tool for lightweight encryption on android
Submitted by BrandonB on Mon, 05/04/2015 - 12:07pm
information security risk
Throughput
SUN JCE cryptographic provider
stream ciphers
standards
smart phones
PBKDF2 password based key generation method
PBKDF2
password based authentication
NCRYPT application
mobile device
lightweight encryption scheme
Lightweight Encryption
JNI
Java native interface
AES encryption scheme
information security
HummingBird2
Hummingbird-2 scheme
encryption
DES encryption scheme
Cryptography
cryptographic key
cryptographic algorithms
confidential data
Ciphers
C language
block ciphers
Android platform
android
biblio
Rethinking SSL Development in an Appified World
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:46pm
security
mitma
ios
apps
android
SSL
file
Multi-App Security Analysis: Looking for Android App Collusion
Submitted by brad_martin on Tue, 04/22/2014 - 11:23am. Contributor:
Rogan Creswick
Presented as part of the
2014 HCSS conference
.
Abstract:
android
data flow
Galois
security
static analysis
tools
Research Organization
Presentation
HCSS'14
Mobility (HCSS'14)
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »