|
|
|
Catarina Palma, Artur Ferreira and Mário Figueiredo
The presence of malicious software (malware), for example, in Android applications (apps), has harmful or irreparable consequences to the user and/or the device. Despite the protections app stores provide to avoid malware, it keeps growing in sophisticat...
ver más
|
|
|
|
|
|
|
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ...
ver más
|
|
|
|
|
|
|
Manish Bhurtel and Danda B. Rawat
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and...
ver más
|
|
|
|
|
|
|
Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content prov...
ver más
|
|
|
|
|
|
|
Yukun Zhou, Ningsheng Wu, Baidong Hu, Yitao Zhang, Jingyun Qiu and Weiming Cai
Face recognition payment is a new type of payment method, with AI face recognition technology as the core, and its speed and convenience are more in line with the users? payment habits. However, the face is a biological feature with weak privacy, and the...
ver más
|
|
|
|
|
|
|
Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also b...
ver más
|
|
|
|
|
|
|
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software...
ver más
|
|
|
|
|
|
|
Sergey Agafyin,Stanislav Smyshlyaev
Pág. 84 - 89
The task of enabling usage of cryptographic software (especially, for working with digital signature) with general-purpose mobile devices (e.g., smartphones with iOS or Android operation systems) is inevitably discussed during all conference discussions ...
ver más
|
|
|
|
|
|
|
Arthur Fournier, Franjieh El Khoury and Samuel Pierre
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for m...
ver más
|
|
|
|
|
|
|
Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo and Antonella Santone
The Android platform is currently targeted by malicious writers, continuously focused on the development of new types of attacks to extract sensitive and private information from our mobile devices. In this landscape, one recent trend is represented by t...
ver más
|
|
|
|