Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile malware
biblio
A Survey on Mobile Malware Detection Methods using Machine Learning
Submitted by grigby1 on Fri, 03/03/2023 - 12:16pm
malware
mobile malware
dynamic malware detection
iOS Security
Traffic detection
Mobile communication
Mobile Security
operating systems
Compositionality
machine learning
Runtime
telecommunication traffic
Conferences
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
LuxLeak: Capturing Computing Activity Using Smart Device Ambient Light Sensors
Submitted by grigby1 on Tue, 09/19/2017 - 12:08pm
ambient light sensor
eavesdropping
Human behavior
keystroke analysis
lux
Metrics
mobile malware
Mobile Security
privacy
pubcrawl
screen emanations
side-channel analysis
smart phone
smart watch
wearable computing
biblio
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Submitted by grigby1 on Mon, 04/24/2017 - 11:39am
anonymity
anonymity in wireless networks
composability
data-usage statistics
Human behavior
Metrics
mobile malware
Mobile Security
pubcrawl
Resiliency
Side-channel attack
website fingerprinting
biblio
WristSnoop: Smartphone PINs prediction using smartwatch motion sensors
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
Pins
WristSnoop
wearable computing
wearable computers
watches
Vegetation
smartwatches
smartwatch motion sensors
smartphone PIN prediction
smart phones
sensors
security risks
pubcrawl170115
accelerometer
PIN prediction
p-i-n diodes
numeric keypad entries
motion measurement
Mobile Security
mobile malware
malware
keystroke inference
gyroscopes
gyroscope
Accelerometers
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes
biblio
Dissecting Android Malware: Characterization and Evolution
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
malware
smartphone security
smart phones
representative mobile security software
representative family
Payloads
operating systems (computers)
next-generation antimobile-malware solutions
mobile malware
mobile computing
Mobile communication
mobile antivirus software
activation mechanisms
installation methods
Humanoid robots
evolution-based study
defense capability
computer viruses
carried malicious payloads
Androids
Android platform
Android malware family
Android malware