Filter your results
- 5
- 5
- 5
- 2
- 1
- 2
- 5
- 2
- 5
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Automated Security Analysis of IoT Software Updates13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.223-239, ⟨10.1007/978-3-030-41702-4_14⟩
Conference papers
hal-03173903v1
|
||
|
An Empirical Evaluation of the Android Security Framework28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.176-189, ⟨10.1007/978-3-642-39218-4_14⟩
Conference papers
hal-01463826v1
|
||
|
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.121-139, ⟨10.1007/978-3-030-22479-0_7⟩
Conference papers
hal-02384600v1
|
||
|
Enabling Next-Generation Cyber Ranges with Mobile Security Components32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.150-165, ⟨10.1007/978-3-030-64881-7_10⟩
Conference papers
hal-03239813v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|