scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
Proceedings ArticleDOI
14 Apr 2015
29 Citations
Our evaluation shows that AppCage can successfully detect and block attempts to leak private information by third-party apps, and the performance overhead caused by AppCage is negligible for apps without native libraries and minor for apps with them.
This method is very useful to hide the secret images.
Results from a deployment of AppIS on several kinds of popular apps demonstrate that the new design can prevent our apps from cumulative attack without extra performance cost.
This method could be very effective to hide some information in some executable file.
Our experience with using COVERT to examine over 500 real-world apps corroborates its ability to find inter-app vulnerabilities in bundles of some of the most popular apps on the market.
Our evaluation shows that DiPrint is able to accurately identify dual-instance apps with negligible overhead.
An important advantage of our method is that it targets particular versions of apps, allowing previously disfavored apps to be recommended when user-relevant features are added.

See what other people are reading

How has the frequency and sophistication of malware attacks evolved over the past decade?
5 answers
The frequency and sophistication of malware attacks have significantly increased over the past decade. Malware has evolved from simple worms and viruses to multi-stage campaigns with complex evasion mechanisms, driven by its role as a commodity in the cybercrime economy. The growth of malware has been particularly notable in the mobile domain, with a rise in attacks targeting smartphone platforms. Research indicates an exponential increment in aspects like size and estimated effort of malware development, reflecting its increasing complexity and industry-like production model. As technology advances, cybercriminals continuously create new ways to gain unauthorized access to valuable information stored on devices, contributing to the escalating sophistication and impact of malware attacks.
What are the gaps in "Predictive Analytics for Cybersecurity"?
5 answers
Gaps in predictive analytics for cybersecurity include the challenge of false positives in leakage detection due to inaccurate FPR predictions. Additionally, the black box problem in AI predictions poses a barrier, requiring expert confirmation and hindering AI expansion. Furthermore, the need for explainable AI (XAI) to enhance the reliability of predictions and efficiently detect false alarms is evident. The existing literature emphasizes the importance of developing more effective prediction models to combat evolving cyber threats, highlighting gaps in current approaches and suggesting areas for further research. Addressing these gaps through improved prediction accuracy, explainability, and reliability can enhance cybersecurity measures and aid in the timely response to cyber threats.
How effective are machine learning algorithms in detecting and preventing ransomware attacks?
5 answers
Machine learning algorithms have proven highly effective in detecting and preventing ransomware attacks. Studies have shown that machine learning models, such as XGBoost and ElasticNet, achieve high accuracy rates of 90% in identifying ransomware attacks on IoT devices running PureOS. Additionally, various machine learning models, including Logistic Regression, K-Nearest Neighbor, and Naive Bayes, have demonstrated accuracy rates between 97% and 100% in distinguishing ransomware encrypted files from other file types, emphasizing the importance of file extensions in the process. Furthermore, experiments utilizing neural networks and other machine learning methods have successfully detected new attack classes, highlighting the effectiveness of these algorithms in combating evolving cybersecurity threats. The use of stream data mining classification techniques, like the Hoeffding trees classifier, has also shown promising results with a classification accuracy of 99.41% in detecting and preventing ransomware attacks.
How counters are used in data processing?
5 answers
Counters play a crucial role in data processing across various applications. They are utilized for tasks such as measurement accuracy maintenance, processing counter data in state machines, encrypting data blocks using counter values for security, and performing redundant arithmetic operations in computer systems. Data logics often rely on counters to specify properties on structured data, linking satisfiability problems to reachability problems for counter systems. By incrementing counters upon data block updates, encryption operations can be enhanced for improved data security. Overall, counters are fundamental components in data processing, enabling efficient measurement, state transitions, encryption, and arithmetic operations in various computational contexts.
How does blockchain technology differ from traditional database systems?
5 answers
Blockchain technology differs from traditional database systems by offering features like immutability, traceability, transparency, availability, and decentralization. Unlike traditional systems, blockchain ensures secure data sharing through attribute encryption, on-chain/off-chain collaboration, and smart contract-based log tracking. It enhances data transparency, information security, and knowledge sharing, surpassing traditional methods. Blockchain's decentralized nature, immutability, and anonymity address privacy concerns in identity management systems, unlike centralized systems with privacy threats and single points of failure. Additionally, blockchain tackles the scalability issue of full replica storage in traditional systems by introducing an Information-Centric Networking-based storage architecture, improving data availability and access time significantly.
Wat is the background study of event management system?
5 answers
The background study of event management systems involves exploring various technological approaches to streamline event organization processes. One aspect focuses on the development of website-based portals for remote event administration, simplifying tasks for administrators and participants. Another perspective delves into the advantages and challenges of utilizing microservices in system architecture, offering flexibility in technology selection but potentially facing delays in remote connections. Additionally, there are innovative systems incorporating visible light communication to enhance participant engagement and automate event progress management. Furthermore, research highlights the importance of evolving detection systems in cybersecurity, emphasizing the analysis of events and risk levels to combat sophisticated threats effectively. Overall, these studies contribute to enhancing event management efficiency, incident resolution, and system security in various domains.
What are the negative impact of Drones in terms of Dependence on Weather for Consumers?
5 answers
Consumer-based drone applications face negative impacts due to their dependence on weather conditions.Drones' reliability for time-sensitive operations is hindered by weather limitations, affecting their flyability globally.Adverse weather can disrupt routine drone operations, leading to flight delays and economic losses.Weather conditions pose safety risks for drones, especially in crowded areas like cities, where visibility and control can be compromised.Additionally, the effects of weather on small unmanned aircraft systems (sUAS) are significant, impacting operators, observers, and aircraft during missions, especially when flying beyond visual line of sight (BVLOS).These challenges highlight the need for advancements in weather-resistant drones and comprehensive weather observation and avoidance systems to mitigate the negative impacts of weather dependence on consumer drone applications.
What are requirements for IoT in manufactoring industries?
5 answers
The requirements for IoT in manufacturing industries include cornerstone technologies like IoT and cyber-physical systems, IoT monitoring data as the foundation, big data platforms as the support system, an upgraded computing paradigm as the catalyst, and machine learning-based data analysis as the primary processor. Security is also crucial, with a focus on mutual authentication methods to ensure secure communication in IIoT-enabled systems. Additionally, the need for reliable tracking of production performance in old manufacturing machines is addressed through end-to-end IoT solutions, emphasizing secure encryption key management for communication security. These requirements collectively aim to enhance productivity, quality, and security in smart manufacturing environments within the Industry 4.0 framework.
Background information on the prevalence and impact of data breaches in the retail and e-commerce sectors?
5 answers
Data breaches in the retail and e-commerce sectors pose significant threats, leading to severe financial losses and reputational damage for organizations. These breaches result in the theft of personal data, including financial information and identities, exposing individuals to risks like identity theft. The impact of a data breach can vary based on the type and amount of stolen data, with sensitive personally identifiable information (SPII) breaches leading to higher costs and class-action lawsuits. Despite advancements in security controls like encryption, breaches remain a prevalent issue due to evolving cyber threats and human errors. Organizations must prioritize cybersecurity investments and adhere to laws and regulations to protect individuals' privacy and mitigate the consequences of data breaches in the retail and e-commerce sectors.
How does the layered architecture of Android applications improve scalability and maintainability?
4 answers
The layered architecture of Android applications, as proposed in various research papers, enhances scalability and maintainability through several key mechanisms. Firstly, the Abstraction Layered Architecture (ALA) facilitates improved software modularity, reducing computational overhead and enhancing maintainability. ALA allows for the management of hypotheses at different abstraction levels, aiding in the development of maintainable code bases. Additionally, the ALA-based development method has shown a significant reduction in maintenance costs over time, further emphasizing its benefits for scalability and maintainability. Moreover, the use of convolutional neural networks and evolutionary algorithms in Android application maintenance evaluation helps overcome class imbalance issues, leading to better prediction of maintainability and ultimately contributing to scalability and maintainability improvements.
What impact does the use of technology, such as evaluation apps, have on bystander behavior during an incident?
4 answers
The use of technology, such as evaluation apps, can have varying impacts on bystander behavior during an incident. Research suggests that safety apps, like campus safety apps, do not impede bystander intervention in campus sexual assault incidents. Additionally, the design of a CPR procedure guide in the form of an Android application aims to assist bystanders in providing consistent and high-quality CPR to cardiac arrest victims, potentially impacting the success of saving lives. Moreover, studies on bystander intervention in violent emergencies indicate that the affiliation of bystanders with the participants can influence helping behavior, with in-group bystanders potentially decreasing the likelihood of intervention. Effective risk communication and crisis communication through technology can also improve the quality of actual helping behavior by bystanders after witnessing an accident.