惊惶 发表于 2025-3-28 16:31:16

Using Provenance Patterns to Vet Sensitive Behaviors in Android Appsrmation. Dagger identifies behaviors by matching the provenance graph with the behavior graph patterns that are previously extracted from the internal working logic of the Android framework. We evaluate Dagger on both a set of over 1200 known malicious Android apps, and a second set of 1000 apps ran

Infinitesimal 发表于 2025-3-28 20:40:18

SplitDroid: Isolated Execution of Sensitive Components for Mobile Applicationsen the isolated component and normal Android apps, such that non-privacy-related information can be interchanged to ensure its correct execution. Finally, we demonstrate the feasibility and effectiveness of SplitDroid through a case study.

绝食 发表于 2025-3-29 02:31:32

Kernel Data Attack Is a Realistic Security Threatckers can steal sensitive information. Therefore, existing defense mechanisms including those deployed at hypervisor level that search for hidden processes/hidden modules, or monitor kernel code integrity, will not be able to detect DLOGGER. To counter against kernel data attack, by classifying kern

mitral-valve 发表于 2025-3-29 06:45:56

http://reply.papertrans.cn/87/8636/863501/863501_44.png

Expostulate 发表于 2025-3-29 07:17:44

SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Servicen both the kernel and user spaces. It not only allows flexible interactions between a PAL and untrusted environments, but also improved the utilization of resources, without compromising the security of the PAL. We have implemented SuperCall on top of a tiny hypervisor. To demonstrate and evaluate S

antecedence 发表于 2025-3-29 11:32:07

http://reply.papertrans.cn/87/8636/863501/863501_46.png

TOM 发表于 2025-3-29 19:08:01

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Androidnformation flow across framework code, handling callback functions, and expressing all information-flow tracking at the bytecode level. Our evaluation of Uranine shows that it is accurate at detecting privacy leaks and has acceptable performance overhead.

CALL 发表于 2025-3-29 23:33:42

http://reply.papertrans.cn/87/8636/863501/863501_48.png

colony 发表于 2025-3-30 03:57:11

http://reply.papertrans.cn/87/8636/863501/863501_49.png

wreathe 发表于 2025-3-30 06:46:17

http://reply.papertrans.cn/87/8636/863501/863501_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Security and Privacy in Communication Networks; 11th International C Bhavani Thuraisingham,XiaoFeng Wang,Vinod Yegneswa Conference proceedi