Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Alexandre Bartel"'
Publikováno v:
ACM Computing Surveys.
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting in the growing adoption of so-called cryptocurrency wallet applications, as these simplify transactions. These wallets are available in a myriad of different for
Autor:
Jordan Samhi, Alexandre Bartel
Publikováno v:
Samhi, J & Bartel, A 2022, ' On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps ', IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3822-3836 . https://doi.org/10.1109/TDSC.2021.3108057
Android is present in more than 85% of mobile devices, making it a prime target for malware. Malicious code is becoming increasingly sophisticated and relies on logic bombs to hide itself from dynamic analysis. In this article, we perform a large sca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c34b0d8747621cfffa5b150de5f685b2
https://curis.ku.dk/portal/da/publications/on-the-ineffectiveness-of-static-logic-bomb-detection-for-android-apps(176dc097-57c9-4e59-ae26-34e273f2898f).html
https://curis.ku.dk/portal/da/publications/on-the-ineffectiveness-of-static-logic-bomb-detection-for-android-apps(176dc097-57c9-4e59-ae26-34e273f2898f).html
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031168147
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::971046952d0732c357f75c7c06da6a9e
https://doi.org/10.1007/978-3-031-16815-4_31
https://doi.org/10.1007/978-3-031-16815-4_31
Publikováno v:
IEEE Transactions on Information Forensics and Security. 14:2167-2178
Invalid object initialization vulnerabilities have been identified since the 1990’s by a research group at Princeton University. These vulnerabilities are critical since they can be used to totally compromise the security of a Java virtual machine.
Publikováno v:
ICSE (Companion Volume)
Autor:
Eric Bodden, Benjamin Andow, Alexandre Bartel, Adwait Nadkarni, William Enck, Sigmund Albert Gorski, Sunil Manandhar
Publikováno v:
CODASPY
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received relat
Publikováno v:
ACM Conference on Computer and Communications Security
When created, the Java platform was among the first runtimes designed with security in mind. Yet, numerous Java versions were shown to contain far-reaching vulnerabilities, permitting denial-of-service attacks or even worse allowing intruders to bypa
Publikováno v:
International Symposium on Engineering Secure Software and Systems
International Symposium on Engineering Secure Software and Systems, Apr 2016, London, United Kingdom
Lecture Notes in Computer Science ISBN: 9783319308050
ESSoS
International Symposium on Engineering Secure Software and Systems, Apr 2016, London, United Kingdom
Lecture Notes in Computer Science ISBN: 9783319308050
ESSoS
Current low-level exploits often rely on code-reuse, whereby short sections of code (gadgets) are chained together into a coherent exploit that can be executed without the need to inject any code. Several protection mechanisms attempt to eliminate th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cbe423fe46f554ec1b246634893e2361
http://arxiv.org/abs/1605.08159
http://arxiv.org/abs/1605.08159
Autor:
Yu-Chen Chang, Andreas Follner, Kyriakos K. Ispoglou, Alexandre Bartel, Eric Bodden, Hui Peng, Mathias Payer
Publikováno v:
Security and Trust Management ISBN: 9783319465975
STM
STM
Return-Oriented Programming (ROP) is the cornerstone of today’s exploits. Yet, building ROP chains is predominantly a manual task, enjoying limited tool support. Many of the available tools contain bugs, are not tailored to the needs of exploit dev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::90513179860cca9e93a3405821bd1147
https://doi.org/10.1007/978-3-319-46598-2_15
https://doi.org/10.1007/978-3-319-46598-2_15