-
1
-
-
85019033404
-
-
Palo Alto Netw., Santa Clara, CA, USA
-
C. Xiao, Wirelurker: A New Era in iOS and OS X Malware, Palo Alto Netw., Santa Clara, CA, USA, 2014.
-
(2014)
Wirelurker: A New Era in IOS and OS X Malware
-
-
Xiao, C.1
-
3
-
-
85019038694
-
-
Santa Clara, CA, USA [Online]. Available
-
C. Xiao, KeyRaider: iOS Malware Steals Over 225, 000 Apple Accounts to Create Free App Utopia. Palo Alto Netw., Santa Clara, CA, USA, 2015. [Online]. Available: http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-Apple-Accounts-Tocreate-free-App-utopia/
-
(2015)
KeyRaider: IOS Malware Steals over 225, 000 Apple Accounts to Create Free App Utopia. Palo Alto Netw.
-
-
Xiao, C.1
-
4
-
-
85080711655
-
The ghost in the browser analysis of Web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, "The ghost in the browser analysis of Web-based malware, " in Proc. Conf. 1st Workshop Hot Topics Understand. Botnets, Berkeley, CA, USA, 2007, p. 4.
-
(2007)
Proc. Conf. 1st Workshop Hot Topics Understand. Botnets, Berkeley, CA, USA
, pp. 4
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
6
-
-
84981526422
-
-
Apple Accessed on Feb. 1, 2016. [Online]. Available
-
Apple. (2015). iOS Security. Accessed on Feb. 1, 2016. [Online]. Available: https://www.apple.com/business/docs/iOS-Security-Guide.pdf
-
(2015)
IOS Security
-
-
-
8
-
-
85014660262
-
-
Netmarketshare Accessed on Feb. 1, 2016. [Online]. Available
-
Netmarketshare. (2015). Desktop Operating System Market Share. Accessed on Feb. 1, 2016. [Online]. Available: https://www.netmarketshare.com/operating-system-market-share.aspx
-
(2015)
Desktop Operating System Market Share
-
-
-
9
-
-
85019014604
-
-
[Online]. Available
-
L. Xing, et al., Unauthorized Cross-App Resource Access on MAC OS X and iOS, Cornel Univ. Libr., Ithaca, NY, USA, 2015. [Online]. Available: http://arxiv.org/pdf/1505.06836v1.pdf
-
(2015)
Unauthorized Cross-App Resource Access on MAC OS X and IOS, Cornel Univ. Libr., Ithaca, NY, USA
-
-
Xing, L.1
-
10
-
-
84923675775
-
Understanding information hiding in iOS
-
Jan.
-
L. Caviglione and W. Mazurczyk, "Understanding information hiding in iOS, " IEEE Comput., vol. 48, no. 1, pp. 62-65, Jan. 2015.
-
(2015)
IEEE Comput.
, vol.48
, Issue.1
, pp. 62-65
-
-
Caviglione, L.1
Mazurczyk, W.2
-
11
-
-
84881124452
-
Protect my privacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing
-
Y. Agarwal and M. Hall, "ProtectMyPrivacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing, " in Proc. Int. Conf. Mobile Syst. Appl. Services, Taipei, Taiwan, 2013, pp. 97-110.
-
(2013)
Proc. Int. Conf. Mobile Syst. Appl. Services, Taipei, Taiwan
, pp. 97-110
-
-
Agarwal, Y.1
Hall, M.2
-
12
-
-
84872118819
-
An analysis of the iKee B iPhone botnet
-
Heidelberg, Germany: Springer-Verlag
-
P. Porras, H. Saïdi, and V. Yegneswaran, "An analysis of the iKee.B iPhone botnet, " in Security and Privacy in Mobile Information and Communication Systems. Heidelberg, Germany: Springer-Verlag, 2010, pp. 141-152.
-
(2010)
Security and Privacy in Mobile Information and Communication Systems
, pp. 141-152
-
-
Porras, P.1
Saïdi, H.2
Yegneswaran, V.3
-
13
-
-
77955716041
-
Roving bugnet: Distributed surveillance threat and mitigation
-
R. Farley and X. Wang, "Roving bugnet: Distributed surveillance threat and mitigation, " Comput. Security, vol. 29, no. 5, pp. 592-602, 2010.
-
(2010)
Comput. Security
, vol.29
, Issue.5
, pp. 592-602
-
-
Farley, R.1
Wang, X.2
-
14
-
-
33747629222
-
Data exfiltration and covert channels
-
Orlando, FL, USA [Online]. Available
-
A. Giani, V. H. Berk, and G. V. Cybenko, "Data exfiltration and covert channels, " in Proc. Sensors Command Control Commun. Intell. (C3I) Technol. Homeland Security Homeland Defense V, vol. 6201. Orlando, FL, USA, 2006, pp. 1-11. [Online]. Available: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1284782#
-
(2006)
Proc. Sensors Command Control Commun. Intell. (C3I) Technol. Homeland Security Homeland Defense v
, vol.6201
, pp. 1-11
-
-
Giani, A.1
Berk, V.H.2
Cybenko, G.V.3
-
15
-
-
70449624176
-
PhishCatch-A phishing detection tool
-
Seattle, WA, USA
-
W. D. Yu, S. Nargundkar, and N. Tiruthani, "PhishCatch-A phishing detection tool, " in Proc. IEEE Int. Conf. Comput. Softw. Appl., vol. 2. Seattle, WA, USA, 2009, pp. 451-456.
-
(2009)
Proc. IEEE Int. Conf. Comput. Softw. Appl.
, vol.2
, pp. 451-456
-
-
Yu, W.D.1
Nargundkar, S.2
Tiruthani, N.3
-
16
-
-
84883376655
-
Detecting malicious landing pages in malware distribution networks
-
G. Wang, J. W. Stokes, C. Herley, and D. Felstead, "Detecting malicious landing pages in malware distribution networks, " in Proc. IEEE/IFIP Int. Conf. Depend. Syst. Netw. (DSN), Budapest, Hungary, 2013, pp. 1-11.
-
(2013)
Proc. IEEE/IFIP Int. Conf. Depend. Syst. Netw. (DSN), Budapest, Hungary
, pp. 1-11
-
-
Wang, G.1
Stokes, J.W.2
Herley, C.3
Felstead, D.4
-
17
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "RiskRanker: Scalable and accurate zero-day android malware detection, " in Proc. Int. Conf. Mobile Syst. Appl. Services, 2012, pp. 281-294.
-
(2012)
Proc. Int. Conf. Mobile Syst. Appl. Services
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
18
-
-
77954707625
-
Malware detection based on mining API calls
-
A. Sami, et al., "Malware detection based on mining API calls, " in Proc. ACM Symp. Appl. Comput., Lausanne, Switzerland, 2010, pp. 1020-1025.
-
(2010)
Proc. ACM Symp. Appl. Comput., Lausanne, Switzerland
, pp. 1020-1025
-
-
Sami, A.1
-
19
-
-
85068675731
-
Detecting malware domains at the upper DNS hierarchy
-
M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon, "Detecting malware domains at the upper DNS hierarchy, " in Proc. USENIX Conf. Security, San Francisco, CA, USA, 2011, p. 27.
-
(2011)
Proc. USENIX Conf. Security, San Francisco, CA, USA
, pp. 27
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
21
-
-
84912008171
-
Exfiltrating data from Android devices
-
Feb.
-
Q. Do, B. Martini, and K.-K. R. Choo, "Exfiltrating data from Android devices, " Comput. Security, vol. 48, pp. 74-91, Feb. 2015.
-
(2015)
Comput. Security
, vol.48
, pp. 74-91
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
22
-
-
84905749657
-
The visual microphone: Passive recovery of sound from video
-
Jul.
-
A. Davis, et al., "The visual microphone: Passive recovery of sound from video, " ACM Trans. Graph., vol. 33, no. 4, pp. 1-10, Jul. 2014.
-
(2014)
ACM Trans. Graph.
, vol.33
, Issue.4
, pp. 1-10
-
-
Davis, A.1
-
23
-
-
84887954672
-
On covert acoustical mesh networks in air
-
M. Hanspach and M. Goetz, "On covert acoustical mesh networks in air, " J. Commun., vol. 8, no. 11, pp. 758-767, 2014.
-
(2014)
J. Commun.
, vol.8
, Issue.11
, pp. 758-767
-
-
Hanspach, M.1
Goetz, M.2
-
24
-
-
84912019769
-
-
New Scientist, Haywards Heath, U.K. [Online]. Available
-
P. Marks, Hackers Reverse-Engineer NSA's Leaked Bugging Devices, New Scientist, Haywards Heath, U.K., 2014. [Online]. Available: https://www.newscientist.com/article/mg22229744-000-hackers-reverseengineer-nsas-leaked-bugging-devices
-
(2014)
Hackers Reverse-Engineer NSA's Leaked Bugging Devices
-
-
Marks, P.1
-
25
-
-
84905969331
-
Bridging the air gap: Inaudible data exfiltration by insiders
-
S. J. O'Malley and K.-K. R. Choo, "Bridging the air gap: Inaudible data exfiltration by insiders, " in Proc. Americas Conf. Inf. Syst., Savannah, GA, USA, 2014, pp. 1-12.
-
(2014)
Proc. Americas Conf. Inf. Syst., Savannah, GA, USA
, pp. 1-12
-
-
O'Malley, S.J.1
Choo, K.-K.R.2
-
26
-
-
84898003401
-
Identifying back doors, attack points, and surveillance mechanisms in iOS devices
-
J. Zdziarski, "Identifying back doors, attack points, and surveillance mechanisms in iOS devices, " Digit. Invest., vol. 11, no. 1, pp. 3-19, 2014.
-
(2014)
Digit. Invest.
, vol.11
, Issue.1
, pp. 3-19
-
-
Zdziarski, J.1
-
27
-
-
85019017443
-
-
McAfee McAfee Inc., Santa Clara, CA, USA [Online]. Available
-
McAfee, Grand Theft Data. Data Exfiltration Study: Actors, Tactics, and Detection, McAfee Inc., Santa Clara, CA, USA, 2015. [Online]. Available: http://www.mcafee.com/us/resources/reports/rp-data-exfiltration.pdf
-
(2015)
Grand Theft Data. Data Exfiltration Study: Actors, Tactics, and Detection
-
-
-
28
-
-
84961113703
-
-
Lancaster Univ., Security Lancaster Centre, Lancaster, U.K., Tech. Rep.
-
A. Rashid, et al., "Detecting and preventing data exfiltration, " Lancaster Univ., Security Lancaster Centre, Lancaster, U.K., Tech. Rep., 2014.
-
(2014)
Detecting and Preventing Data Exfiltration
-
-
Rashid, A.1
-
30
-
-
85019036455
-
-
McAfee Intel Security, Santa Clara, CA, USA
-
McAfee, Stop Data Exfiltration, Intel Security, Santa Clara, CA, USA, 2015.
-
(2015)
Stop Data Exfiltration
-
-
-
31
-
-
63349106731
-
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
-
Y. Liu, C. Corbett, R. Archibald, B. Mukherjee, and D. Ghosal, "SIDD: A framework for detecting sensitive data exfiltration by an insider attack, " in Proc. IEEE Hawaii Int. Conf. Syst. Sci., 2009, pp. 1-10.
-
(2009)
Proc. IEEE Hawaii Int. Conf. Syst. Sci.
, pp. 1-10
-
-
Liu, Y.1
Corbett, C.2
Archibald, R.3
Mukherjee, B.4
Ghosal, D.5
-
32
-
-
84867364903
-
Addressing security and privacy risks in mobile applications
-
Sep./Oct.
-
A. Jain and D. Shanbhag, "Addressing security and privacy risks in mobile applications, " IT Prof., vol. 14, no. 5, pp. 28-33, Sep./Oct. 2012.
-
(2012)
IT Prof.
, vol.14
, Issue.5
, pp. 28-33
-
-
Jain, A.1
Shanbhag, D.2
-
34
-
-
85019049270
-
-
Palo Alto Netw., Santa Clara, CA, USA [Online]. Available
-
C. Xiao, Update: XcodeGhost Attacker Can Phish Passwords and Open URLs Through Infected Apps, Palo Alto Netw., Santa Clara, CA, USA, 2015. [Online]. Available: http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-Attacker-can-phish-passwords-And-open-urlsthough-infected-Apps
-
(2015)
Update: XcodeGhost Attacker Can Phish Passwords and Open URLs Through Infected Apps
-
-
Xiao, C.1
-
35
-
-
84949096402
-
An adversary model to evaluate DRM protection of video contents on iOS devices
-
Feb. [Online]. Available
-
C. D'Orazio and K.-K. R. Choo, "An adversary model to evaluate DRM protection of video contents on iOS devices, " Comput. Security, vol. 56, pp. 94-110, Feb. 2016. [Online]. Available: http://dx.doi.org/10.1016/j.cose.2015.06.009
-
(2016)
Comput. Security
, vol.56
, pp. 94-110
-
-
D'Orazio, C.1
Choo, K.-K.R.2
-
36
-
-
84866663678
-
-
Wired, San Francisco, CA, USA [Online]. Available
-
M. Honan, How Apple and Amazon Security Flaws Led to My Epic Hacking, Wired, San Francisco, CA, USA, 2012. [Online]. Available: http://www.wired.com/2012/08/apple-Amazon-mat-honan-hacking/
-
(2012)
How Apple and Amazon Security Flaws Led to My Epic Hacking
-
-
Honan, M.1
-
37
-
-
84919570761
-
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
-
J. Imgraben, A. Engelbrecht, and K.-K. R. Choo, "Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users, " Behav. Inf. Technol., vol. 33, no. 12, pp. 1347-1360, 2014.
-
(2014)
Behav. Inf. Technol.
, vol.33
, Issue.12
, pp. 1347-1360
-
-
Imgraben, J.1
Engelbrecht, A.2
Choo, K.-K.R.3
-
38
-
-
84947587045
-
A forensically sound adversary model for mobile devices
-
[Online]. Available
-
Q. Do, B. Martini, and K.-K. R. Choo, "A forensically sound adversary model for mobile devices, " PLoS ONE, vol. 10, no. 9, pp. 1-15, 2015. [Online]. Available: http://dx.doi.org/10.1371/journal.pone.0138449
-
(2015)
PLoS ONE
, vol.10
, Issue.9
, pp. 1-15
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
39
-
-
84964790214
-
Radio access network virtualization for the social Internet of Things
-
Nov./Dec.
-
H. Li, M. Dong, and K. Ota, "Radio access network virtualization for the social Internet of Things, " IEEE Cloud Comput., vol. 2, no. 6, pp. 42-50, Nov./Dec. 2015.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.6
, pp. 42-50
-
-
Li, H.1
Dong, M.2
Ota, K.3
-
40
-
-
84939569136
-
Securing distributed storage for social Internet of Things using regenerating code and Blom key agreement
-
J. Wu, M. Dong, K. Ota, L. Liang, and Z. Zhou, "Securing distributed storage for social Internet of Things using regenerating code and Blom key agreement, " Peer to Peer Netw. Appl., vol. 8, no. 6, pp. 1133-1142, 2015.
-
(2015)
Peer to Peer Netw. Appl.
, vol.8
, Issue.6
, pp. 1133-1142
-
-
Wu, J.1
Dong, M.2
Ota, K.3
Liang, L.4
Zhou, Z.5
|