Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Giuseppe Petracca"'
Publikováno v:
IEEE Communications Surveys & Tutorials. 23:1125-1159
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day lives. From small household devices to large industrial machines, smart devices have become very popular in every possible application domain. Smart devices in
Publikováno v:
ARES
Modern malware is complex, stealthy, and employ anti-forensics techniques to evade detection. In order to detect malware, data must be collected, such, allows further analyses of the malware's behaviour. However, when both the malware and the detecti
Publikováno v:
SACMAT
While we have long had principles describing how access control enforcement should be implemented, such as the reference monitor concept, imprecision in access control mechanisms and access control policies leads to risks that may enable exploitation
Autor:
Ranjbar A. Balisane, Ahmad Atamli-Reineh, Andrew J. Martin, Ravishankar Borgaonkar, Giuseppe Petracca
Publikováno v:
SysTEX@Middleware
Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal dat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8284486f4190963f8ecda89326b56aa1
https://ora.ox.ac.uk/objects/uuid:8f01389d-1fa8-4771-917c-750fa65bbdee
https://ora.ox.ac.uk/objects/uuid:8f01389d-1fa8-4771-917c-750fa65bbdee
Publikováno v:
ACSAC
Cloud computing platforms are now constructed as distributed, modular systems of cloud services, which enable cloud users to manage their cloud resources. However, in current cloud platforms, cloud services fully trust each other, so a malicious user
Publikováno v:
MILCOM
Sensed location data is subject to inference attacks by cybercriminals that aim to obtain the exact position of sensitive locations, such as the victim's home and work locations, to launch a variety of different attacks. Various Location-Privacy Pres
Publikováno v:
ACSAC
Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::af62b0c2e4089a7b13cea29a6e122c34
http://arxiv.org/abs/1604.00320
http://arxiv.org/abs/1604.00320
Publikováno v:
CLOUD
Infrastructure-as-a-Service (IaaS) clouds can be viewed as distributed systems of cloud services that are entrusted to execute users' cloud commands to provision and manage clouds computing resources (e.g., VM). However, recent vulnerabilities found
Publikováno v:
Concurrency and Computation: Practice and Experience. 29:e4130
The size and complexity of modern applications are the underlying causes of numerous security vulnerabilities. In order to mitigate the risks arising from such vulnerabilities, various techniques have been proposed to isolate the execution of sensiti
Publikováno v:
CCSW
IaaS clouds offer customers on-demand computing resources such as virtual machine, network and storage. To provision and manage these resources, cloud users must rely on a variety of cloud services. However, a wide range of vulnerabilities have been