-
1
-
-
85035043216
-
-
Apple, iOS Security, viewed 28 June, 2015
-
Apple, iOS Security, 2015, viewed 28 June 2016. https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
-
(2016)
-
-
-
2
-
-
84869429339
-
The most dangerous code in the world: validating SSL certificates in non-browser software
-
Proceedings of the ACM Conference on Computer and Communications Security
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, V. Shmatikov, The most dangerous code in the world: validating SSL certificates in non-browser software, in: Proceedings of the ACM Conference on Computer and Communications Security, 2012, pp. 38–49.
-
(2012)
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
3
-
-
85035010942
-
-
The San Bernardino iPhone case is over; the war has just begun, 29 March, AppAdvice, viewed 28 June, 2016
-
J. Byrnes, The San Bernardino iPhone case is over; the war has just begun, 29 March, AppAdvice, 2016, viewed 28 June 2016. http://appadvice.com/post/the-san-bernardino-iphone-case-is-over-the-war-has-just-begun/709112.
-
(2016)
-
-
Byrnes, J.1
-
4
-
-
85034966208
-
-
Uber's App is Anything but Malware, 10 December, BETTER, viewed 28 June, 2014
-
W. Clark, Uber's App is Anything but Malware, 10 December, BETTER, 2014, viewed 28 June 2016. http://better.mobi/2014/12/10/ubers-app-is-anything-but-malware/.
-
(2016)
-
-
Clark, W.1
-
5
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini, B., Choo, K.-K.R., An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9:2 (2012), 71–80.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
6
-
-
84896319180
-
Google drive: Forensic analysis of data remnants
-
Quick, D., Choo, K.-K.R., Google drive: Forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
7
-
-
84877809583
-
Dropbox analysis: Data remnants on user machines
-
Quick, D., Choo, K.-K.R., Dropbox analysis: Data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
8
-
-
84884589497
-
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
-
Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
-
(2013)
Digit. Investig.
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
9
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick, D., Choo, K.-K.R., Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
10
-
-
84902429611
-
Cloud Storage Forensics
-
Syngress/ Elsevier
-
Quick, D., Martini, B., Choo, K.-K.R., Cloud Storage Forensics. 2013, Syngress/ Elsevier.
-
(2013)
-
-
Quick, D.1
Martini, B.2
Choo, K.-K.R.3
-
11
-
-
84920152770
-
Distributed filesystem forensics: XtreemFS as a case study
-
Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 11:4 (2014), 295–313.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
12
-
-
84961218182
-
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
-
Daryabar, F., Dehghantanha, A., Eterovic-Soric, B., Choo, K.-K.R., Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices. Aust. J. Forensic Sci. (AJFS), 2016, 10.1080/00450618.2015.1110620.
-
(2016)
Aust. J. Forensic Sci. (AJFS)
-
-
Daryabar, F.1
Dehghantanha, A.2
Eterovic-Soric, B.3
Choo, K.-K.R.4
-
13
-
-
84963876744
-
Cloud storage forensics: MEGA as a case study
-
Daryabar, F., Dehghantanha, A., Choo, K.-K.R., Cloud storage forensics: MEGA as a case study. Aust. J. Forensic Sci. (AJFS), 2016, 10.1080/00450618.2016.1153714.
-
(2016)
Aust. J. Forensic Sci. (AJFS)
-
-
Daryabar, F.1
Dehghantanha, A.2
Choo, K.-K.R.3
-
14
-
-
84953356466
-
SugarSync forensic analysis
-
Shariati, M., Dehghantanha, A., Choo, K.-K.R., SugarSync forensic analysis. Aust. J. Forensic Sci. (AJFS) 48:1 (2016), 95–117, 10.1080/00450618.2015.1021379.
-
(2016)
Aust. J. Forensic Sci. (AJFS)
, vol.48
, Issue.1
, pp. 95-117
-
-
Shariati, M.1
Dehghantanha, A.2
Choo, K.-K.R.3
-
15
-
-
84971492452
-
Cloud incident handling and forensic-by-design: cloud storage as a case study
-
Rahman, N.H.A., Cahyani, N.D.W., Choo, K.-K.R., Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurr. Comput.: Pract. Exper., 2016, 10.1002/cpe.3868.
-
(2016)
Concurr. Comput.: Pract. Exper.
-
-
Rahman, N.H.A.1
Cahyani, N.D.W.2
Choo, K.-K.R.3
-
16
-
-
84963613034
-
Forensic taxonomy of popular android nhealth apps
-
Proceedings of the Americas Conference on Information Systems, AMCIS, Puerto Rico, USA.
-
A. Azfar, K.-K.R. Choo, L. Liu, Forensic taxonomy of popular android nhealth apps, in: Proceedings of the Americas Conference on Information Systems, AMCIS, Puerto Rico, USA, 2015.
-
(2015)
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
17
-
-
84986921995
-
An android communication app forensic taxonomy
-
Azfar, A., Choo, K.-K.R., Liu, L., An android communication app forensic taxonomy. J. Forensic Sci. 61:5 (2016), 1337–1350.
-
(2016)
J. Forensic Sci.
, vol.61
, Issue.5
, pp. 1337-1350
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
18
-
-
85006165710
-
Forensic taxonomy of android social apps
-
in press
-
Azfar, A., Choo, K.-K.R., Liu, L., Forensic taxonomy of android social apps. J. Forensic Sci., 2017 in press.
-
(2017)
J. Forensic Sci.
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
19
-
-
84978047769
-
Forensic taxonomy of android productivity apps
-
in press.
-
Azfar, A., Choo, K.-K.R., Liu, L., Forensic taxonomy of android productivity apps. Multimedia Tools Appl., 2016 in press. http://dx.doi.org/10.1007/s11042-016-3718-2.
-
(2016)
Multimedia Tools Appl.
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
20
-
-
84942364406
-
A taxonomy of mhealth apps–security and privacy concerns
-
Proceedings of the Hawaii International Conference on System Sciences, HICSS, Kauai, HI
-
M. Plachkinova, S. Andrés, S. Chatterjee, A taxonomy of mhealth apps–security and privacy concerns, in: Proceedings of the Hawaii International Conference on System Sciences, HICSS, Kauai, HI, 2015, pp. 3187–3196.
-
(2015)
, pp. 3187-3196
-
-
Plachkinova, M.1
Andrés, S.2
Chatterjee, S.3
-
21
-
-
84967138126
-
Android cache taxonomy and forensic process
-
IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland
-
F. Immanuel, B. Martini, K.-K.R. Choo, Android cache taxonomy and forensic process, in: IEEE Trustcom/BigDataSE/ISPA, Vol. 1, Helsinki, Finland, 2015, pp. 1094–1101.
-
(2015)
, vol.1
, pp. 1094-1101
-
-
Immanuel, F.1
Martini, B.2
Choo, K.-K.R.3
-
22
-
-
84950250183
-
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
-
New York, NY, USA
-
Heartfield, R., Loukas, G., A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR), 48(3), 2016, 10.1145/2835375 New York, NY, USA.
-
(2016)
ACM Comput. Surv. (CSUR)
, vol.48
, Issue.3
-
-
Heartfield, R.1
Loukas, G.2
-
23
-
-
84889085369
-
A critical review of 7 years of mobile device forensics
-
Barmpatsalou, K., Damopoulos, D., Kambourakis, G., Katos, V., A critical review of 7 years of mobile device forensics. Digit. Investig. 10:4 (2013), 323–349.
-
(2013)
Digit. Investig.
, vol.10
, Issue.4
, pp. 323-349
-
-
Barmpatsalou, K.1
Damopoulos, D.2
Kambourakis, G.3
Katos, V.4
-
24
-
-
84925118436
-
Cloud forensic technical challenges and solutions: A snapshot
-
Martini, B., Choo, K.-K.R., Cloud forensic technical challenges and solutions: A snapshot. IEEE Cloud Comput. 1:4 (2014), 20–25.
-
(2014)
IEEE Cloud Comput.
, vol.1
, Issue.4
, pp. 20-25
-
-
Martini, B.1
Choo, K.-K.R.2
-
25
-
-
84958034911
-
Android mobile VoIP apps: a survey and examination of their security and privacy
-
Azfar, A., Choo, K.-K.R., Liu, L., Android mobile VoIP apps: a survey and examination of their security and privacy. Electron. Commer. Res. 16:1 (2016), 73–111.
-
(2016)
Electron. Commer. Res.
, vol.16
, Issue.1
, pp. 73-111
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
26
-
-
84930177021
-
Securing android: A survey, taxonomy, and challenges
-
Sufatrio, Darell, J.J.T., Tong-Wei, C., Vrizlynn, L.L.T., Securing android: A survey, taxonomy, and challenges. ACM Comput. Surv. 47:4 (2015), 1–45.
-
(2015)
ACM Comput. Surv.
, vol.47
, Issue.4
, pp. 1-45
-
-
Sufatrio1
Darell, J.J.T.2
Tong-Wei, C.3
Vrizlynn, L.L.T.4
-
27
-
-
84873712223
-
A survey on security for mobile devices
-
La Polla, M., Martinelli, F., Sgandurra, D., A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15:1 (2013), 446–471.
-
(2013)
IEEE Commun. Surv. Tutor.
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
28
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.C., On the security of public key protocols. IEEE Trans. Inf. Technol. 29:2 (1983), 198–208.
-
(1983)
IEEE Trans. Inf. Technol.
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
29
-
-
33845638668
-
Refuting security proofs for tripartite key exchange with model checker in planning problem setting
-
Proceedings of the IEEE Computer Security Foundations Workshop, CSFW
-
K.-K.R. Choo, Refuting security proofs for tripartite key exchange with model checker in planning problem setting, in: Proceedings of the IEEE Computer Security Foundations Workshop, CSFW, 2006, pp. 297–308.
-
(2006)
, pp. 297-308
-
-
Choo, K.-K.R.1
-
30
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag
-
Bellare, M., Pointcheval, D., Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proceedings of EUROCRYPT LNCS, vol. 1807/2000, 2000, Springer-Verlag, 139–155.
-
(2000)
Proceedings of EUROCRYPT, LNCS
, vol.vol. 1807/2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
31
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag
-
Bellare, M., Rogaway, P., Entity authentication and key distribution. Proceedings of the Advances in Cryptology, Vol. 773, 1993, Springer-Verlag, 232–249.
-
(1993)
Proceedings of the Advances in Cryptology, Vol. 773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
32
-
-
84949096402
-
An adversary model to evaluate DRM protection of video contents on OS devices
-
D'Orazio, C., Choo, K.-K.R., An adversary model to evaluate DRM protection of video contents on OS devices. Comput. Secur. 56C (2016), 94–110.
-
(2016)
Comput. Secur.
, vol.56C
, pp. 94-110
-
-
D'Orazio, C.1
Choo, K.-K.R.2
-
33
-
-
85035049584
-
-
Apple, How to delete an app that has a configuration profile on your iPhone, iPad, or iPod touch, viewed 14 June, 2015
-
Apple, How to delete an app that has a configuration profile on your iPhone, iPad, or iPod touch, 2015, viewed 14 June 2016. https://support.apple.com/en-au/HT205347.
-
(2016)
-
-
-
34
-
-
84952030369
-
A comparison of static, dynamic, and hybrid analysis for malware detection
-
Damodaran, A., Di Tropia, F., Visaggio, C.A., Austin, T.H., Stamp, M., A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech., 2015, 1–12.
-
(2015)
J. Comput. Virol. Hacking Tech.
, pp. 1-12
-
-
Damodaran, A.1
Di Tropia, F.2
Visaggio, C.A.3
Austin, T.H.4
Stamp, M.5
-
35
-
-
84960933928
-
Employing program semantics for malware detection
-
Naval, S., Laxmi, V., Rajarajan, M., Gaur, M.S., Conti, M., Employing program semantics for malware detection. IEEE Trans. Inf. Forensics Secur., 10(12), 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.12
-
-
Naval, S.1
Laxmi, V.2
Rajarajan, M.3
Gaur, M.S.4
Conti, M.5
-
36
-
-
84994744881
-
A technique to circumvent SSL/TLS validations on iOS devices
-
in press.
-
D'Orazio, C.J., Choo, K.-K.R., A technique to circumvent SSL/TLS validations on iOS devices. Future Gener. Comput. Syst., 2016 in press. http://dx.doi.org/10.1016/j.future.2016.08.019.
-
(2016)
Future Gener. Comput. Syst.
-
-
D'Orazio, C.J.1
Choo, K.-K.R.2
-
37
-
-
84961351749
-
Malicious sequential pattern mining for automatic malware detection
-
Fan, Y., Ye, Y., Chen, L., Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52 (2016), 16–25, 10.1016/j.eswa.2016.01.002.
-
(2016)
Expert Syst. Appl.
, vol.52
, pp. 16-25
-
-
Fan, Y.1
Ye, Y.2
Chen, L.3
-
38
-
-
84975230776
-
A probabilistic discriminative model for android malware detection with decompiled source code
-
Cen, L., Gates, C.S., Si, L., Li, N., A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Trans. Dependable Secure Comput. 12:4 (2015), 400–412.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.12
, Issue.4
, pp. 400-412
-
-
Cen, L.1
Gates, C.S.2
Si, L.3
Li, N.4
-
39
-
-
85035013857
-
-
IOS Application Security Testing Cheat Sheet, 11 January, OWASP, viewed 10 June, 2016
-
O. Cornea, J. Haddix, IOS Application Security Testing Cheat Sheet, 11 January, OWASP, 2016, viewed 10 June 2016. https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet.
-
(2016)
-
-
Cornea, O.1
Haddix, J.2
-
40
-
-
85035031432
-
-
Arxan, Arxan's Code Obfuscation, viewed 20 June.
-
Arxan, Arxan's Code Obfuscation, 2016, viewed 20 June, 2016. https://www.arxan.com/products/obfuscation.
-
(2016)
-
-
-
41
-
-
84919570761
-
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
-
Imgraben, J., Engelbrecht, A., Choo, K.-K.R., Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33:12 (2014), 1347–1360.
-
(2014)
Behav. Inf. Technol.
, vol.33
, Issue.12
, pp. 1347-1360
-
-
Imgraben, J.1
Engelbrecht, A.2
Choo, K.-K.R.3
-
42
-
-
85035076931
-
-
ZDnet, Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, viewed 14 June, 2016
-
ZDnet, Apple iPhone, iPad iOS 9 security flaw lets malicious apps sneak onto enterprise devices, 2016, viewed 14 June 2016. http://www.zdnet.com/article/apple-iphone-ipad-ios-9-security-flaw-lets-malicious-apps-sneak-onto-enterprise-devices/.
-
(2016)
-
-
|