Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Xiaohan Helu"'
Publikováno v:
IEEE Access, Vol 7, Pp 178321-178330 (2019)
Android system attackers have proposed various attack schemes to invade users' privacy. One way is to use ADB (Android Debug Bridge) with advanced permissions but low protection. In order to set up an ADB connection successfully, the USB debugging op
Externí odkaz:
https://doaj.org/article/48c2911834604af3b4d5995987d16666
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
This work focuses mainly on the penetration test function and stability of Android smartphones under Kali 2019 and creates a stable penetration function of Android smartphones to form a strong reverse transmission control protocol connection. Using t
Externí odkaz:
https://doaj.org/article/03acac44a8b5455da8a01c7857270708
Publikováno v:
IEEE Transactions on Network Science and Engineering. 9:2052-2065
The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively protect important Andro
Publikováno v:
IEEE Network. 35:215-221
Among all ongoing attacks on mobile, those targeting blockchain-wallet applications raise pressing concerns due to the risks of potential monetary loss. These attacks mainly focus on the theft and forwarding of keys in executable files. The challenge
Publikováno v:
Mobile Networks and Applications. 26:1723-1732
How to efficiently and reasonably analyze binary programs has always been the primary issue in the field of software security. As for the stack, the current technology has begun to show limitations on various conditions. In this work, we will introdu
Publikováno v:
IEEE Access, Vol 7, Pp 178321-178330 (2019)
Android system attackers have proposed various attack schemes to invade users' privacy. One way is to use ADB (Android Debug Bridge) with advanced permissions but low protection. In order to set up an ADB connection successfully, the USB debugging op
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
This work focuses mainly on the penetration test function and stability of Android smartphones under Kali 2019 and creates a stable penetration function of Android smartphones to form a strong reverse transmission control protocol connection. Using t
Publikováno v:
ICIoT
Traditional signature-based malware detection approaches are sensitive to small changes in the malware code. Currently, most malware programs are adapted from existing programs. Hence, they share some common patterns but have different signatures. To
Publikováno v:
Transactions on Emerging Telecommunications Technologies. 31
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030242732
ICAIS (1)
ICAIS (1)
Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb9f9c1ecba4591419318416ee5aeff7
https://doi.org/10.1007/978-3-030-24274-9_54
https://doi.org/10.1007/978-3-030-24274-9_54