Výsledky vyhľadávania - Security and privacy Systems security Operating systems security Mobile platform security
-
1
US Patent Issued on Nov. 13 for "Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms" (Colorado Inventor)
Vydavateľské údaje: Washington, D.C HT Digital Streams Limited 15.11.2018Vydané v US Fed News Service, Including US State News (15.11.2018)Získať plný text
Newsletter -
2
A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems
ISSN: 1545-0678Vydavateľské údaje: IEEE 01.07.2013Vydané v Proceedings - International Conference on Distributed Computing Systems Workshops (01.07.2013)“… In this paper, we discuss the components of a mobile operating system that require enhancements in the security and privacy controls that are inherent in modern mobile operating systems…”
Získať plný text
Konferenčný príspevok.. -
3
Companiesandmarkets.com: Operating System and Hardware Platform Convergence is Simplifying Hacking; Boosting Growth Potential in the Mobile Security Market
Vydavateľské údaje: New York Business Wire 03.10.2011Vydané v Business Wire (03.10.2011)“… consumer interest in mobile computing equipment and smartphones are contributing to an increase in potential security and privacy risks, according to a new report…”
Získať plný text
Newsletter -
4
US Patent Issued to NCC GROUP SECURITY SERVICES on Dec. 15 for "Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms" (Virginia, New York Inventors)
Vydavateľské údaje: Washington, D.C HT Digital Streams Limited 16.12.2015Vydané v US Fed News Service, Including US State News (16.12.2015)Získať plný text
Newsletter -
5
Fortinet(r): Fortinet Announces Carrier-Specific Multi-Threat Security Platform, Supports Cloud-Based Security Services; New FortiCarrier Operating System and Hardware Platform Bring Unique Carrier-Grade Capabilities for VOIP, Mobile Content Security
Vydavateľské údaje: Coventry Normans Media Ltd 05.05.2009Vydané v M2 Presswire (05.05.2009)“…: securing voice-over-IP infrastructures and mobile operator content, and enabling automated provisioning and management of security policies on a per-user basis…”
Získať plný text
Newsletter -
6
Fortinet Announces Carrier-Specific Multi-Threat Security Platform, Supports Cloud-Based Security Services; New FortiCarrier Operating System and Hardware Platform Bring Unique Carrier-Grade Capabilities for VOIP, Mobile Content Security
Vydavateľské údaje: Normans Media Ltd 05.05.2009Vydané v M2 Presswire (05.05.2009)Získať plný text
Newspaper Article -
7
F-Secure Ships Mobile Antivirus for Newest Series 60 Smartphones; Security Vendor Offers Protection for Newest Symbian OS Platform; World's Most Common Mobile Phone Operating System
Vydavateľské údaje: New York PR Newswire Association LLC 04.05.2006Vydané v PR Newswire (04.05.2006)“… 3.0 with support for S60 3rd Edition platform, the newest generation of the world's leading smartphone software operating system from Symbian…”
Získať plný text
Newsletter -
8
Addonics Announces Advanced Platform, Software and Operating System Independent Hard Drive Security Solution for Mobile User's Sensitive Data
Vydavateľské údaje: Business Wire, Inc 23.08.2010Vydané v Business Wire (23.08.2010)Získať plný text
Newspaper Article -
9
Companiesandmarkets.com: Operating System and Hardware Platform Convergence is Simplifying Hacking; Boosting Growth Potential in the Mobile Security Market
Vydavateľské údaje: Business Wire, Inc 03.10.2011Vydané v Business Wire (03.10.2011)Získať plný text
Newspaper Article -
10
Addonics Announces Advanced Platform, Software and Operating System Independent Hard Drive Security Solution for Mobile User's Sensitive Data
Vydavateľské údaje: New York Business Wire 23.08.2010Vydané v Business Wire (23.08.2010)“…Among the features of the Cipher Drive SC are Smart Card + PIN authentication; full disk hardware encryption using AES 256-bit key strength; an…”
Získať plný text
Newsletter -
11
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications
ISBN: 1665402962, 9781665402965ISSN: 1558-1225Vydavateľské údaje: IEEE 01.05.2021Vydané v Proceedings / International Conference on Software Engineering (01.05.2021)“…Third-party libraries (TPLs) as essential parts in the mobile ecosystem have become one of the most significant contributors to the huge success of Android, which facilitate the fast development of Android applications…”
Získať plný text
Konferenčný príspevok.. -
12
sNPU: Trusted Execution Environments on Integrated NPUs
Vydavateľské údaje: IEEE 29.06.2024Vydané v 2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA) (29.06.2024)“…Trusted execution environment (TEE) promises strong security guarantee with hardware extensions for security-sensitive tasks…”
Získať plný text
Konferenčný príspevok.. -
13
RAP-Track: Efficient Control Flow Attestation via Parallel Tracking in Commodity MCUs
Vydavateľské údaje: IEEE 22.06.2025Vydané v 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Control Flow Attestation (CFA) has emerged as an important security service to enable remote verification of control flow paths in safety-critical embedded systems…”
Získať plný text
Konferenčný príspevok.. -
14
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities
ISSN: 2643-1572Vydavateľské údaje: IEEE 11.09.2023Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… However, the vulnerabilities hiding in the smart contracts of DeFi apps have resulted in numerous security incidents, with most of them leading to funds (tokens…”
Získať plný text
Konferenčný príspevok.. -
15
Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components
ISSN: 2643-1572Vydavateľské údaje: IEEE 11.09.2023Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…Existing Android malware detection systems primarily concentrate on detecting malware apps, leaving a gap in the research concerning the detection of malicious components in apps…”
Získať plný text
Konferenčný príspevok.. -
16
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators
ISSN: 2643-1572Vydavateľské údaje: ACM 27.10.2024Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Deploying deep learning (DL) models on mobile applications (Apps) has become ever-more popular…”
Získať plný text
Konferenčný príspevok.. -
17
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense
Vydavateľské údaje: IEEE 09.07.2023Vydané v 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“… technique, namely return-to-non-secure (ret2ns). We experimentally confirmed the feasibility of four variants of ret2ns attacks on two Cortex-M hardware systems…”
Získať plný text
Konferenčný príspevok.. -
18
How Android Apps Break the Data Minimization Principle: An Empirical Study
ISSN: 2643-1572Vydavateľské údaje: IEEE 11.09.2023Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…The Data Minimization Principle is crucial for protecting individual privacy. However, existing Android runtime permissions do not guarantee this principle…”
Získať plný text
Konferenčný príspevok.. -
19
An Industrial Practice for Securing Android Apps in the Banking Domain
ISSN: 2643-1572Vydavateľské údaje: IEEE 11.09.2023Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… Mobile banking has a lot of advantages, but it also has security concerns. Illegal access to personal and financial information often occurs due to lapses in mobile security…”
Získať plný text
Konferenčný príspevok.. -
20
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs
ISSN: 2643-1572Vydavateľské údaje: IEEE 11.09.2023Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… However, MiniApps raise new security and privacy concerns as they can access partially or all of host apps' system resources, including sensitive personal data…”
Získať plný text
Konferenčný príspevok..

