Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT
暂无分享,去创建一个
Xuan Wang | Jing Li | Yun-Ju Huang | Yang Xiang | Junbin Fang | Frankie Li
[1] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[2] Bo Li,et al. Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach , 2017, Comput. Secur..
[3] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[4] Xiapu Luo,et al. RootGuard: Protecting Rooted Android Phones , 2014, Computer.
[5] Yanfang Ye,et al. SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks , 2017, ACSAC.
[6] Tao Zhang,et al. Can We Trust the Privacy Policies of Android Apps? , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[7] Lei Xue,et al. AndroidPerf: A cross-layer profiling system for Android applications , 2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS).
[8] Christopher Krügel,et al. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware , 2015, NDSS.
[9] Hovav Shacham,et al. Mouse Trap: Exploiting Firmware Updates in USB Peripherals , 2014, WOOT.
[10] Milda Macenaite,et al. From universal towards child-specific protection of the right to privacy online: Dilemmas in the EU General Data Protection Regulation , 2017, New Media Soc..
[11] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Giuseppe Ateniese,et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[13] Abdelouahid Derhab,et al. MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..
[14] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[15] Yajin Zhou,et al. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART , 2017, USENIX Security Symposium.
[16] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[17] Meg Leta Jones,et al. AI and the Ethics of Automating Consent , 2018, IEEE Security & Privacy.
[18] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[19] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[20] Lei Cen,et al. AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications , 2015, CCS.
[21] Lei Xue,et al. Toward Automatically Generating Privacy Policy for Android Apps , 2017, IEEE Transactions on Information Forensics and Security.
[22] Hareton K. N. Leung,et al. Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy , 2018, IEEE Transactions on Software Engineering.
[23] Vrizlynn L. L. Thing,et al. Securing Android , 2015, ACM Comput. Surv..
[24] Xiapu Luo,et al. On Tracking Information Flows through JNI in Android Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[25] Xiapu Luo,et al. DexHunter: Toward Extracting Hidden Code from Packed Android Applications , 2015, ESORICS.
[26] Minh Hai Nguyen,et al. Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning , 2018, Comput. Secur..
[27] Wei Chen,et al. CloudBot: Advanced mobile botnets using ubiquitous cloud technologies , 2017, Pervasive Mob. Comput..