Sciweavers

NDSS
2015
IEEE
8 years 6 months ago
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
Abstract—The pervasiveness of security-critical external resources (e.g accessories, online services) poses new challenges to Android security. In prior research we revealed that...
Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed...
NDSS
2015
IEEE
8 years 6 months ago
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware
—Embedded devices have become ubiquitous, and they are used in a range of privacy-sensitive and security-critical applications. Most of these devices run proprietary software, an...
Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser...
NDSS
2015
IEEE
8 years 6 months ago
Principled Sampling for Anomaly Detection
Abstract—Anomaly detection plays an important role in protecting computer systems from unforeseen attack by automatically recognizing and filter atypical inputs. However, it can...
Brendan Juba, Christopher Musco, Fan Long, Stelios...
NDSS
2015
IEEE
8 years 6 months ago
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
—A wealth of recent research proposes static data flow analysis for the security analysis of Android applications. One of the building blocks that these analysis systems rely up...
Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, M...
NDSS
2015
IEEE
8 years 6 months ago
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers
—Use-after-free vulnerabilities have become an important class of security problems due to the existence of mitigations that protect against other types of vulnerabilities. The e...
Yves Younan
NCA
2015
IEEE
8 years 6 months ago
A patent time series processing component for technology intelligence by trend identification functionality
: Technology intelligence indicates the concept and applications that transform data hidden in patents or scientific literatures into technical insight for technology strategy-maki...
Hongshu Chen, Guangquan Zhang, Donghua Zhu, Jie Lu
NCA
2015
IEEE
8 years 6 months ago
The generalized hybrid weighted average operator based on interval neutrosophic hesitant set and its application to multiple att
: The Neutrosophic set and Hesitant set are the important tools to describe the fuzzy information, in this paper, we combine the interval neutrosophic sets (INSs) and interval valu...
Peide Liu, Lanlan Shi
NCA
2015
IEEE
8 years 6 months ago
How important is a transfer function in discrete heuristic algorithms
Transfer functions are considered the simplest and cheapest operators in designing discrete heuristic algorithms. The main advantage of such operators is the maintenance of the str...
Shahrzad Saremi, Seyedali Mirjalili, Andrew Lewis