Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
android
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
android
vulnerabilities detection approach
system call
security vulnerabilities detection
security bugs
malicious Android application
detection process
detection algorithm
cyber attackers
Android security vulnerabilities
Android operating systems
system calls
anomaly detection techniques
Compositionality
Android (operating system)
security
vulnerability detection
Measurement
security vulnerabilities
Computer bugs
Anomaly Detection
Correlation
Metrics
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
Software
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
Prevention of Data Leakage due to Implicit Information Flows in Android Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
privacy policy enforcement
taint analysis
Smalien enforced privacy policy
implicit information flows
implicit information flow
IIFs
IIF-contained information
IIF-accompanied attacks
IIF tricks
IIF detection technique
explicit information
dynamic taint analysis technique
dynamic taint analysis
DTA technique
Android applications
security of data
Android (operating system)
android
Instruments
data leakage
Metrics
privacy
composability
pubcrawl
mobile computing
performance evaluation
security
Runtime
data privacy
Servers
biblio
A Qualitative Analysis of Android Taint-Analysis Results
Submitted by aekwall on Mon, 01/27/2020 - 10:27am
pubcrawl
composability
Metrics
taint analysis
android
path conditions
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
Scalability
mobile computing
mobility features
pattern locking recognition
pattern locks
privacy
pubcrawl
resilience
Resiliency
lock screen application
secure login implementation
smart phones
smartphone application
testing
user privacy
Wi-Fi Mac Address
Wireless fidelity
wireless LAN
Ease of Use
authentication
authentication mechanism
authorisation
Context
Context Data
context data analysis
data analysis
data privacy
android
environmental context recognition
Global Positioning System
GPS location
Human behavior
human factor
Human Factors
invulnerable environment
biblio
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
Linux
Servers
Scalability
Resiliency
pubcrawl
peer-to-peer solutions
Peer-to-peer computing
Monte Carlo methods
Mobile handsets
mobile computing
mobile cloud computing
middleware
Metadata Discovery Problem
metadata
meta data
android
image file
File discovery service
distributed mobile-cloud apps
Distributed databases
Decision trees
Decision Tree
context-aware file discovery system
context-aware file discovery service
Computation offloading
composability
cloud-based metadata server
Cloud Computing
CAFDS
Android (operating system)
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
android
Correlation
Cyber-Infrastructure
graph analysis
graph theory
Human behavior
malware
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
Submitted by grigby1 on Fri, 02/22/2019 - 4:11pm
malware
static code analysis
static analysis frameworks
static analysis
Semantics
semantic features
Resiliency
pubcrawl
program diagnostics
obfuscation techniques
obfuscation
meta data
manifest-based features
malware detection
android
malicious applications
invasive software
Human behavior
Hardware
feature extraction
Cryptography
composability
commercial antiviruses
code-based features
application metadata-based features
android malware static analysis
Android (operating system)
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »