Eight Years of Rider Measurement in the Android Malware Ecosystem (English)
- New search for: Suarez-Tangil, Guillermo
- Further information on Suarez-Tangil, Guillermo:
-
https://orcid.org/0000-0002-0455-2553
- New search for: Stringhini, Gianluca
- New search for: Suarez-Tangil, Guillermo
- Further information on Suarez-Tangil, Guillermo:
-
https://orcid.org/0000-0002-0455-2553
- New search for: Stringhini, Gianluca
In:
IEEE Transactions on Dependable and Secure Computing
;
19
, 1
;
107-118
;
2022
- Article (Journal) / Electronic Resource
-
Title:Eight Years of Rider Measurement in the Android Malware Ecosystem
-
Contributors:Suarez-Tangil, Guillermo ( author ) / Stringhini, Gianluca ( author )
-
Published in:IEEE Transactions on Dependable and Secure Computing ; 19, 1 ; 107-118
-
Publisher:
- New search for: IEEE
-
Publication date:2022-01-01
-
Size:1815874 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 19, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Verifying and Monitoring IoTs Network Behavior Using MUD ProfilesHamza, Ayyoob / Ranathunga, Dinesha / Gharakheili, Hassan Habibi / Benson, Theophilus A. / Roughan, Matthew / Sivaraman, Vijay et al. | 2022
- 19
-
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster RescueSu, Zhou / Wang, Yuntao / Xu, Qichao / Zhang, Ning et al. | 2022
- 33
-
Self-Stabilizing Secure ComputationBrownstein, Dan / Dolev, Shlomi / Kumaramangalam, Muni Venkateswarlu et al. | 2022
- 39
-
Detecting Sybil Attacks Using Proofs of Work and Location in VANETsBaza, Mohamed / Nabil, Mahmoud / Mahmoud, Mohamed M. E. A. / Bewermeier, Niclas / Fidan, Kemal / Alasmary, Waleed / Abdallah, Mohamed et al. | 2022
- 54
-
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics ApproachWalia, Gurjit Singh / Aggarwal, Kartik / Singh, Kuldeep / Singh, Kunwar et al. | 2022
- 67
-
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple EvaluatorsLi, Jin / Ye, Heng / Li, Tong / Wang, Wei / Lou, Wenjing / Hou, Y. Thomas / Liu, Jiqiang / Lu, Rongxing et al. | 2022
- 77
-
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder ModelCheng, Yao / Xu, Chang / Hai, Zhen / Li, Yingjiu et al. | 2022
- 91
-
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted DataLi, Rui / Liu, Alex X. / Xu, Huanle / Liu, Ying / Yuan, Huaqiang et al. | 2022
- 107
-
Eight Years of Rider Measurement in the Android Malware EcosystemSuarez-Tangil, Guillermo / Stringhini, Gianluca et al. | 2022
- 119
-
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoTLi, Yannan / Susilo, Willy / Yang, Guomin / Yu, Yong / Liu, Dongxi / Du, Xiaojiang / Guizani, Mohsen et al. | 2022
- 131
-
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in MicrogridsYang, Qingyu / Li, Donghe / An, Dou / Yu, Wei / Fu, Xinwen / Yang, Xinyu / Zhao, Wei et al. | 2022
- 149
-
Authenticated Data Redaction With Accountability and TransparencyMa, Jinhua / Huang, Xinyi / Mu, Yi / Deng, Robert H. et al. | 2022
- 161
-
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoTChehab, Mohamad / Mourad, Azzam et al. | 2022
- 176
-
AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer NetworksAwasthi, Sateesh Kumar / Singh, Yatindra Nath et al. | 2022
- 190
-
Analyzing Security Requirements in Timed Workflow ProcessesDu, Yanhua / Wang, Yang / Yang, Benyuan / Hu, Hesuan et al. | 2022
- 208
-
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling RedundancyGao, Xing / Liu, Guannan / Xu, Zhang / Wang, Haining / Li, Li / Wang, Xiaorui et al. | 2022
- 227
-
On the Validation of Web X.509 Certificates by TLS Interception ProductsWazan, Ahmad Samer / Laborde, Romain / Chadwick, David W. / Venant, Remi / Benzekri, Abdelmalek / Billoir, Eddie / Alfandi, Omar et al. | 2022
- 243
-
Improving the Accuracy of IR-Level Fault InjectionPalazzi, Lucas / Li, Guanpeng / Fang, Bo / Pattabiraman, Karthik et al. | 2022
- 259
-
Using Metrics Suites to Improve the Measurement of Privacy in GraphsZhao, Yuchen / Wagner, Isabel et al. | 2022
- 275
-
Secure Video Transmission Framework for Battery-Powered Video DevicesGo, Kyungmin / Lee, Il-Gu / Kang, Sungwon / Kim, Myungchul et al. | 2022
- 288
-
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU ApplicationsPrevilon, Fritz / Kalra, Charu / Tiwari, Devesh / Kaeli, David et al. | 2022
- 301
-
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment ServicesWang, Cheng / Zhu, Hangyu et al. | 2022
- 316
-
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy ProtectionHan, Dezhi / Pan, Nannan / Li, Kuan-Ching et al. | 2022
- 328
-
Forward and Backward Private DSSE for Range QueriesZuo, Cong / Sun, Shi-Feng / Liu, Joseph K. / Shao, Jun / Pieprzyk, Josef / Xu, Lei et al. | 2022
- 339
-
Optimal Filter Assignment Policy Against Distributed Denial-of-Service AttackBiswas, Rajorshi / Wu, Jie et al. | 2022
- 353
-
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware MitigationSun, Ruimin / Botacin, Marcus / Sapountzis, Nikolaos / Yuan, Xiaoyong / Bishop, Matt / Porter, Donald E. / Li, Xiaolin / Gregio, Andre / Oliveira, Daniela et al. | 2022
- 370
-
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNetSun, Yunqing / Cao, Jin / Ma, Maode / Zhang, Yinghui / Li, Hui / Niu, Ben et al. | 2022
- 388
-
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted DataPeng, Yanguo / Wang, Long / Cui, Jiangtao / Liu, Ximeng / Li, Hui / Ma, Jianfeng et al. | 2022
- 402
-
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network TelescopeTorabi, Sadegh / Bou-Harb, Elias / Assi, Chadi / Karbab, ElMouatez Billah / Boukhtouta, Amine / Debbabi, Mourad et al. | 2022
- 419
-
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFsGao, Yansong / van Dijk, Marten / Xu, Lei / Yang, Wei / Nepal, Surya / Ranasinghe, Damith C. et al. | 2022
- 438
-
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain AdaptationLiu, Shigang / Lin, Guanjun / Qu, Lizhen / Zhang, Jun / De Vel, Olivier / Montague, Paul / Xiang, Yang et al. | 2022
- 452
-
Non-Interactive Multi-Client Searchable Encryption: Realization and ImplementationSun, Shi-Feng / Zuo, Cong / Liu, Joseph K. / Sakzad, Amin / Steinfeld, Ron / Yuen, Tsz Hon / Yuan, Xingliang / Gu, Dawu et al. | 2022
- 468
-
On the Performance of Detecting Injection of Fabricated Messages into the CAN BusOthmane, Lotfi ben / Dhulipala, Lalitha / Abdelkhalek, Moataz / Multari, Nicholas / Govindarasu, Manimaran et al. | 2022
- 482
-
Verifiable Policy-Defined Networking Using MetagraphsRanathunga, Dinesha / Roughan, Matthew / Nguyen, Hung et al. | 2022
- 495
-
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible SignaturesErlacher, Felix / Dressler, Falko et al. | 2022
- 507
-
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor NetworksWang, Chenyu / Wang, Ding / Tu, Yi / Xu, Guoai / Wang, Huaxiong et al. | 2022
- 524
-
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device SecurityPatel, Naman / Krishnamurthy, Prashanth / Amrouch, Hussam / Henkel, Jorg / Shamouilian, Michael / Karri, Ramesh / Khorrami, Farshad et al. | 2022
- 537
-
Improved Fast Rerouting Using PostprocessingFoerster, Klaus-Tycho / Kamisinski, Andrzej / Pignolet, Yvonne-Anne / Schmid, Stefan / Tredan, Gilles et al. | 2022
- 551
-
Conan: A Practical Real-Time APT Detection System With High Accuracy and EfficiencyXiong, Chunlin / Zhu, Tiantian / Dong, Weihao / Ruan, Linqi / Yang, Runqing / Cheng, Yueqiang / Chen, Yan / Cheng, Shuai / Chen, Xutong et al. | 2022
- 566
-
On-the-Fly Privacy for Location HistogramsTheodorakopoulos, George / Panaousis, Emmanouil / Liang, Kaitai / Loukas, George et al. | 2022
- 579
-
Efficient and Precise Secure Generalized Edit Distance and BeyondZhu, Ruiyu / Huang, Yan et al. | 2022
- 591
-
Achieving Efficient Secure Deduplication With User-Defined Access Control in CloudYang, Xue / Lu, Rongxing / Shao, Jun / Tang, Xiaohu / Ghorbani, Ali A. et al. | 2022
- 607
-
JNI Global References Are Still Vulnerable: Attacks and DefensesHe, Yi / Zhou, Yuan / Zhou, Yajin / Li, Qi / Sun, Kun / Gu, Yacong / Jiang, Yong et al. | 2022
- 620
-
Understanding Account Recovery in the Wild and its Security ImplicationsLi, Yue / Chen, Zeyu / Wang, Haining / Sun, Kun / Jajodia, Sushil et al. | 2022
- 635
-
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud StorageXue, Kaiping / Gai, Na / Hong, Jianan / Wei, David S.L. / Hong, Peilin / Yu, Nenghai et al. | 2022
- 647
-
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain TransactionsJia, Yanxue / Sun, Shi-Feng / Zhang, Yuncong / Zhang, Qingzhao / Ding, Ning / Liu, Zhiqiang / Liu, Joseph K. / Gu, Dawu et al. | 2022
- 663
-
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart MetersHarishma, Boyapally / Mathew, Paulson / Patranabis, Sikhar / Chatterjee, Urbi / Agarwal, Umang / Maheshwari, Manu / Dey, Soumyajit / Mukhopadhyay, Debdeep et al. | 2022
- 681
-
Blockchain-Based Certificate Transparency and Revocation TransparencyWang, Ze / Lin, Jingqiang / Cai, Quanwei / Wang, Qiongxiao / Zha, Daren / Jing, Jiwu et al. | 2022
- 698
-
Geometric Range Search on Encrypted Data With Forward/Backward SecurityKermanshahi, Shabnam Kasra / Sun, Shi-Feng / Liu, Joseph K. / Steinfeld, Ron / Nepal, Surya / Lau, Wang Fat / Au, Man Ho Allen et al. | 2022
- 3023
-
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18| 2022