Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Androids
biblio
Post-Mortem Memory Analysis of Cold-Booted Android Devices
Submitted by BrandonB on Mon, 05/04/2015 - 1:11pm
forensic memory dumps
Volatility Plugins
tablet PCs
smart phones
Random access memory
post-mortem memory analysis
Post-mortem Analysis
open-source volatility plugins
mobile computing
Memory Analysis
Linux
Kernel
full disk encryption
FROST tool
Forensics
Android Forensics
DRAM remanence effect
DRAM chips
digital investigation process
Digital Forensics
Dalvik VM memory structures
Dalvik VM
Cryptography
cold-booted Android devices
cold boot attacks
Cold Boot Attack
application level memory
Androids
Android-driven smartphones
Android memory structures
biblio
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Submitted by BrandonB on Mon, 05/04/2015 - 1:10pm
Humanoid robots
storage encryption
Steganography
steganographic techniques
plausibly deniable encryption
PDE
Mobile Platform Security
Mobile handsets
mobile environment
mobile devices
mobile computing
Mobile communication
Mobiflage
MF-SD
MF-MTP variant
Law
Android (operating system)
File system security
FAT32 removable SD cards
Ext4 file system mechanisms
encryption
desktop OS
desktop environment
deniable storage encryption
deniable encryption
decryption keys
data-block allocator
data confidentiality
Cryptography
Androids
Android OS
biblio
Android encryption systems
Submitted by BrandonB on Mon, 05/04/2015 - 1:06pm
Humanoid robots
tablets
smart phones
security-critical environments
security-critical context
security-critical application scenarios
security features
RIM
platform-selection process
nonconsumer area
mobile devices
mobile device sector
Microsoft
ios
Android (operating system)
Google
encryption
device backups
Data protection
Cryptography
consumer-oriented devices
Blackerry
attack susceptibility
Apple
Androids
Android platform deployment analysis
Android encryption systems
biblio
DAIDS: An Architecture for Modular Mobile IDS
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
intrusion detection system
third party mobile applications
telecom operator
security of data
profile applications
North America
Monitoring
modular mobile IDS
mobile radio
mobile devices
mobile computing
malware
malicious behavior
Android (operating system)
Intrusion Detection
Humanoid robots
dynamic analysis
Detectors
detection algorithms
Databases
DAIDS
behavior profiling
behavior analysis
Anomaly Detection
Androids
Android platform
biblio
Dissecting Android Malware: Characterization and Evolution
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
malware
smartphone security
smart phones
representative mobile security software
representative family
Payloads
operating systems (computers)
next-generation antimobile-malware solutions
mobile malware
mobile computing
Mobile communication
mobile antivirus software
activation mechanisms
installation methods
Humanoid robots
evolution-based study
defense capability
computer viruses
carried malicious payloads
Androids
Android platform
Android malware family
Android malware
« first
‹ previous
1
2
3
4
5
6
7