|
|
|
Catarina Palma, Artur Ferreira and Mário Figueiredo
The presence of malicious software (malware), for example, in Android applications (apps), has harmful or irreparable consequences to the user and/or the device. Despite the protections app stores provide to avoid malware, it keeps growing in sophisticat...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo...
ver más
|
|
|
|
|
|
|
Mohammed N. AlJarrah, Qussai M. Yaseen and Ahmad M. Mustafa
The Android platform has become the most popular smartphone operating system, which makes it a target for malicious mobile apps. This paper proposes a machine learning-based approach for Android malware detection based on application features. Unlike man...
ver más
|
|
|
|
|
|
|
Shaked Delarea and Yossi Oren
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a maliciou...
ver más
|
|
|
|
|
|
|
Fazal Raheman, Tejas Bhagat, Brecht Vermeulen and Peter Van Daele
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a ?necessary evil?. Third-party permissions resulting in an attack surface (AS) and in-computer st...
ver más
|
|
|
|
|
|
|
Fazal Raheman
The first week of August 2022 saw the world?s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a rigoro...
ver más
|
|
|
|
|
|
|
Annie Hamilton Gingell and Sina Shahab
This paper seeks to evaluate how successful national policy interventions have been at addressing land barriers to self-build and custom housebuilding when applied by Local Planning Authorities (LPAs) across the South West of England. A longitudinal tria...
ver más
|
|
|
|
|
|
|
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software...
ver más
|
|
|
|
|
|
|
Anna V. Mikhailenko, Vladimir A. Ermolaev and Dmitry A. Ruban
Distant observation of unique geological and geomorphological features facilitates comprehension and tourism of these important resources. Bridges offer an opportunity for such observation, and the idea of bridge-based geoheritage viewpoints is proposed....
ver más
|
|
|
|