Zobrazeno 1 - 10
of 103
pro vyhledávání: '"Chang Rocky"'
Widely-used Android static program analysis tools, e.g., Amandroid and FlowDroid, perform the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to handle modern (large) apps. The average app size has increased thre
Externí odkaz:
http://arxiv.org/abs/2005.11527
Crowdsourcing mobile user's network performance has become an effective way of understanding and improving mobile network performance and user quality-of-experience. However, the current measurement method is still based on the landline measurement p
Externí odkaz:
http://arxiv.org/abs/1703.07551
Mobile network performance measurement is important for understanding mobile user experience, problem diagnosis, and service comparison. A number of crowdsourcing measurement apps (e.g., MobiPerf [4, 6] and Netalyzr [5, 7]) have been embarked for the
Externí odkaz:
http://arxiv.org/abs/1610.01282
Autor:
Wu, Daoyuan, Chang, Rocky K. C.
Today, much of our sensitive information is stored inside mobile applications (apps), such as the browsing histories and chatting logs. To safeguard these privacy files, modern mobile systems, notably Android and iOS, use sandboxes to isolate apps' f
Externí odkaz:
http://arxiv.org/abs/1511.00104
Android apps could expose their components for cooperating with other apps. This convenience, however, makes apps susceptible to the exposed component vulnerability (ECV), in which a dangerous API (commonly known as sink) inside its component can be
Externí odkaz:
http://arxiv.org/abs/1405.6282
Autor:
Wu, Daoyuan, Chang, Rocky K. C.
Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a brows
Externí odkaz:
http://arxiv.org/abs/1404.4553
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus m
Externí odkaz:
http://arxiv.org/abs/1110.5794
Publikováno v:
In Computer Networks 9 December 2013 57(17):3522-3544
Publikováno v:
In Computers & Security November 2013 39 Part B:431-446
Publikováno v:
DSN
Widely-used Android static program analysis tools, e.g., Amandroid and FlowDroid, perform the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to handle modern (large) apps. The average app size has increased thre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d59f3cf81e7deb5e1b68aab1ead4e07e
http://arxiv.org/abs/2005.11527
http://arxiv.org/abs/2005.11527