The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Local databases have become an important component within mobile applications. Developers use local databases to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with a cost. Studies have shown that they are one of the most energy consuming components on mobile devices and misuseof their APIs can lead to performance and security...
Software vulnerabilities pose significant security risks to the host computing system. Faced with continuous disclosure of software vulnerabilities, system administrators must prioritize their efforts, triaging the most critical vulnerabilities to address first. Many vulnerability scoring systems have been proposed, but they all require expert knowledge to determine intricate vulnerability metrics...
In order to bake security into application design, we introduce an adaptation to the Command pattern: command instances are tagged with the permissions required to perform them for each object they manipulate. Prior to executing a command instance issued by a given user, an execution engine validates the user has the required permissions over the objects the command is about to operate on. Stating...
In the last decades, the explosion of the volume of digital document images, and the development of consumer tools to modify these images, has lead to a huge increase on reported fraudulent document cases. This situation has promoted the development of automatic methods for both preventing forgeries in modified documents and detecting them. However, document forensics is a sensitive topic. Data is...
Modern mobile apps incorporate rich and complex features, opening the doors for different security concerns. Android is the dominant platform in mobile app markets, and enhancing its apps security is a considerable area of research. Android malware (introduced intentionally by developers) has been well studied and many tools are available to detect them. However, little attention has been directed...
Assembly execution trace analysis is an effective approach for discovering potential software vulnerabilities. However, the size of the execution traces and the lack of source code makes this a manual, labor-intensive process. Instead of browsing billions of instructions one by one, software security analysts need higher-level information that can provide an overview of the execution of a program...
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
Alongside the fast development of new science and innovation, the elements of Smart gadgets like Smart Phones, Smart TV, smart watches smart home appliances, IoT devices etc. turn out to be increasingly powerful and are playing a basic part in the day today world. Operating systems like Android, iOS, Windows, Blackberry so on gives an operating environment for the Smart devices [1]. Android, a Linux...
The continuing success of synchrophasors has ushered in new subdomains of power system applications for real-time situational awareness, online decision support, and robust system control. In this paper, an adaptive decision-tree-based systematic method for open-loop regional voltage control is developed. This approach employs voltage security assessment method to generate voltage secure and insecure...
Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function...
Machine learning has been a detection technique used by many security vendors for some time now. With the enhancement brought by GPUs, many security products can now use different deep learning methods and forms of neural networks for malware classification. However, these new methods, as powerful as they are, are also limited by the amount of memory a GPU has or by the constant need of transferring...
With the growth of the known malware to more than 600 millions according to AVTest this year, every security solution developed different methods for detecting malicious content. Whether this method consists in signature based detection, emulation, heuristics or different techniques of machine learning, one thing remains a constant in this procedure: a need for a cleanset — a large collection of clean...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
This work presents security solutions related to multi-sensor closed-loop artificial pancreas (AP) systems. The proposed AP system is built on a heterogeneous platform incorporating a smartphone, activity sensors, a glucose monitor, an insulin pump, a laptop hosting the multi-variable control algorithm and a cloud server. Developing a secure AP system is essential for mass adoption among diabetes...
Intelligent video and image analysis technology has been paid much attention recently. But how to effectively evaluate the performance of intelligent video and image analysis methods remains a meaningful and challenging task, which involves many aspects, such as constructing reasonable datasets, developing efficient evaluation tools, designing effective evaluation metrics. We focus on the area of...
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
This short empirical paper investigates how well topic modeling and database meta-data characteristics can classify web and other proof-of-concept (PoC) exploits for publicly disclosed software vulnerabilities. By using a dataset comprised of over 36 thousand PoC exploits, near a 0.9 accuracy rate is obtained in the empirical experiment. Text mining and topic modeling are a significant boost factor...
A good and robust integration system cannot be separated from how the initial design of the system is selected and implemented. Therefore, integrating existing systems to become a large system that meets the needs of other connected systems requires full assessment and verification so that when the system is implemented, the necessary changes required in the future will be able to be accommodated...
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
More data is currently being collected and shared by software applications than ever before. In many cases, the user is asked if either all or none of their data can be shared. We hypothesize that in some cases, users would like to share data in more complex ways. In order to implement the sharing of data using more complicated privacy preferences, complex data sharing policies must be used. These...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.