|
|
|
Manish Bhurtel and Danda B. Rawat
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and...
ver más
|
|
|
|
|
|
|
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software...
ver más
|
|
|
|
|
|
|
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin...
ver más
|
|
|
|
|
|
|
Conor Pirry, Hector Marco-Gisbert and Carolyn Begg
Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5 million for one single vulnerability in Android and up to USD 2 million for Apple?s operating syst...
ver más
|
|
|
|
|
|
|
Amr Amin, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy and Islam Hegazy
|
|
|
|
|
|
|
Jinseong Kim and Im Y. Jung
Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. Howe...
ver más
|
|
|
|