Sfoglia per Autore
Mostrati risultati da 1 a 7 di 7
Assessment of Data Obfuscation with Residue Number Coding
2015-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano; Tiella, Roberto
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis
2016-01-01 Demissie, Biniam Fisseha; Ghio, Davide; Ceccato, Mariano; Avancini, Andrea
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps
2018-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano; Khin Shar, Lwin
Security analysis of permission re-delegation vulnerabilities in Android apps
2020-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin
Security testing of second order permission re-delegation vulnerabilities in Android apps
2020-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano
Experimental comparison of features and classifiers for Android malware detection
2020-01-01 Shar, Lwin Khin; Demissie, Biniam Fisseha; Ceccato, Mariano; Minn, Wei
Assessing the Effectiveness of the Shared Responsibility Model for Cloud Databases: the Case of Google’s Firebase
2021-01-01 Demissie, Biniam Fisseha; Ranise, Silvio
Mostrati risultati da 1 a 7 di 7
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile