Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Petracca, Giuseppe"'
Autor:
Lee, Yu-Tsung, Chen, Haining, Enck, William, Vijayakumar, Hayawardh, Li, Ninghui, Qian, Zhiyun, Petracca, Giuseppe, Jaeger, Trent
Android's filesystem access control is a crucial aspect of its system integrity. It utilizes a combination of mandatory access controls, such as SELinux, and discretionary access controls, like Unix permissions, along with specialized access controls
Externí odkaz:
http://arxiv.org/abs/2302.13506
Autor:
Lee, Yu-Tsung, Enck, William, Chen, Haining, Vijayakumar, Hayawardh, Li, Ninghui, Wang, Daimeng, Qian, Zhiyun, Petracca, Giuseppe, Jaeger, Trent
Android filesystem access control provides a foundation for Android system integrity. Android utilizes a combination of mandatory (e.g., SEAndroid) and discretionary (e.g., UNIX permissions) access control, both to protect the Android platform from A
Externí odkaz:
http://arxiv.org/abs/2008.03593
Modern operating systems such as Android, iOS, Windows Phone, and Chrome OS support a cooperating program abstraction. Instead of placing all functionality into a single program, programs cooperate to complete tasks requested by users. However, untru
Externí odkaz:
http://arxiv.org/abs/1808.05579
The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physic
Externí odkaz:
http://arxiv.org/abs/1802.02041
The emergence of mobile applications to execute sensitive operations has brought a myriad of security threats to both enterprises and users. In order to benefit from the large potential in smartphones there is a need to manage the risks arising from
Externí odkaz:
http://arxiv.org/abs/1606.02995
Smartphones' cameras, microphones, and device displays enable users to capture and view memorable moments of their lives. However, adversaries can trick users into authorizing malicious apps that exploit weaknesses in current mobile platforms to misu
Externí odkaz:
http://arxiv.org/abs/1604.02171
Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical i
Externí odkaz:
http://arxiv.org/abs/1604.00320
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ACM International Conference Proceeding Series; 12/5/2016, p52-64, 13p