Zobrazeno 1 - 10
of 25
pro vyhledávání: '"YURY ZHAUNIAROVICH"'
Publikováno v:
ACM Computing Surveys. Jul2019, Vol. 51 Issue 4, p1-36. 36p.
Autor:
Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers present
Autor:
Sjouke Mauw, Stanislav Dashevskyi, Artsiom Kushniarou, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun
Publikováno v:
BASE-Bielefeld Academic Search Engine
Today, there are millions of third-party Android applications. Some of them are buggy or even malicious. To identify such applications, novel frameworks for automated black-box testing and dynamic analysis are being developed by the Android community
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f25469de418ea3af9178be622e8533bc
http://orbilu.uni.lu/handle/10993/44477
http://orbilu.uni.lu/handle/10993/44477
Autor:
Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman Zonouz
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was he
Autor:
Priyanka Dodia, Yury Zhauniarovich
Publikováno v:
CCS
Distributed Reflected Denial of Service (DRDoS) attacks remain one of the most popular techniques to drain victim's network bandwidth. Despite the goal of disrupting network services of a particular victim, indirectly these attacks affect a large num
Autor:
Priyanka Dodia, Yury Zhauniarovich
Publikováno v:
NetSoft
Distributed Reflected Denial of Service (DRDoS) attacks have been continuing to grow unprecedentedly in the recent years. Attackers abuse genuine services running some application protocols built over UDP to generate amplified traffic targeting victi
Publikováno v:
CODASPY
BASE-Bielefeld Academic Search Engine
BASE-Bielefeld Academic Search Engine
Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even damage the device. In this work we make a step towards combating this threat. We collected and manually
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c410e3ac1006f2db3189ec660dcad7cc
Publikováno v:
Journal of Systems and Software. 159:110386
Dynamic code update techniques ( Android Studio – support for dynamic delivery ), such as dynamic class loading and reflection, enable Android apps to extend their functionality at runtime. At the same time, these techniques are misused by malware
Autor:
Stanislav Dashevskyi, Olga Gadyatskaya, Artsiom Kushniarou, Yury Zhauniarovich, Aleksandr Pilgun
Publikováno v:
CCS
The deluge of Android apps from third-party developers calls for sophisticated security testing and analysis techniques to inspect suspicious apps without accessing their source code. Code coverage is an important metric used in these techniques to e
Publikováno v:
CCS
BASE-Bielefeld Academic Search Engine
BASE-Bielefeld Academic Search Engine
Code coverage is an important metric that is used by automated Android testing and security analysis tools to guide the exploration of applications and to assess efficacy. Yet, there are many different variants of this metric and there is no agreemen