AndroidProtect: Android Apps Security Analysis System

Author(s):  
Tong Zhang ◽  
Tao Li ◽  
Hao Wang ◽  
Zhijie Xiao
Author(s):  
Qi Zhang ◽  
Juanru Li ◽  
Yuanyuan Zhang ◽  
Hui Wang ◽  
Dawu Gu

Author(s):  
Tianyi Li ◽  
Gregorio Convertino ◽  
Ranjeet Kumar Tayi ◽  
Shima Kazerooni ◽  
Gary Patterson

2013 ◽  
Vol 718-720 ◽  
pp. 2376-2382
Author(s):  
Yan Ting Ren ◽  
Li Ji Wu

In order to test the security of cryptographic devices against Side Channel Attacks (SCA), an automatic general-purpose power analysis system (TH-PAS-01) is designed and implemented. TH-PAS-01 is scalable and can be applied to many cryptographic devices when specific modules are installed. Using the system TH-PAS-01, correlation power analysis (CPA) are carried out on an AES chip under two working models: normal and shuffling mode. The security level of the countermeasure provided by the target chip is verified by TH-PAS-01. The experimental results show that the correct key of the AES chip is obtained with around 50,000 power traces when the chip was working under normal mode, while the whole key bits are not obtained with 960,000 power traces when the chip works under shuffling mode. The automatic general-purpose system TH-PAS-01 is feasible for security analysis on power analysis for cryptographic devices.


Author(s):  
Вадим Георгиевич Ерышов

В статье представлена имитационная модель, позволяющая оценивать процесс анализа защищенности в автоматизированных системах организаций в зависимости от варьируемых исходных данных, а также разрабатывать требования для перспективных систем анализа защищенности. The article presents a simulation model that allows you to evaluate the process of security analysis in automated systems of organizations, depending on the varying source data, as well as to develop requirements for advanced security analysis systems.


2021 ◽  
Vol 26 (3) ◽  
Author(s):  
Majid Hatamian ◽  
Samuel Wairimu ◽  
Nurul Momen ◽  
Lothar Fritsch

AbstractAs this article is being drafted, the SARS-CoV-2/COVID-19 pandemic is causing harm and disruption across the world. Many countries aimed at supporting their contact tracers with the use of digital contact tracing apps in order to manage and control the spread of the virus. Their idea is the automatic registration of meetings between smartphone owners for the quicker processing of infection chains. To date, there are many contact tracing apps that have already been launched and used in 2020. There has been a lot of speculations about the privacy and security aspects of these apps and their potential violation of data protection principles. Therefore, the developers of these apps are constantly criticized because of undermining users’ privacy, neglecting essential privacy and security requirements, and developing apps under time pressure without considering privacy- and security-by-design. In this study, we analyze the privacy and security performance of 28 contact tracing apps available on Android platform from various perspectives, including their code’s privileges, promises made in their privacy policies, and static and dynamic performances. Our methodology is based on the collection of various types of data concerning these 28 apps, namely permission requests, privacy policy texts, run-time resource accesses, and existing security vulnerabilities. Based on the analysis of these data, we quantify and assess the impact of these apps on users’ privacy. We aimed at providing a quick and systematic inspection of the earliest contact tracing apps that have been deployed on multiple continents. Our findings have revealed that the developers of these apps need to take more cautionary steps to ensure code quality and to address security and privacy vulnerabilities. They should more consciously follow legal requirements with respect to apps’ permission declarations, privacy principles, and privacy policy contents.


1994 ◽  
Vol 9 (4) ◽  
pp. 1716-1722 ◽  
Author(s):  
K. Demaree ◽  
T.A. Athay ◽  
K.W. Cheung ◽  
Y. Mansour ◽  
E. Vaahedi ◽  
...  

2019 ◽  
Vol 192 (2) ◽  
pp. 321-334
Author(s):  
Dominika Dudziak-Gajowiak ◽  
Grzegorz Kolaczek ◽  
Krzysztof Juszczyszyn

The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic differences in security management in systems with traditional centralized and monolithic architecture as well as in systems with service-oriented architecture have been presented. A layered reference model for service-oriented systems taking account of the basic goals of ICT security for dynamic information systems has been discussed. The basic assumptions of the multi-agent ICT security analysis system in service-oriented systems as well as the results of the safety analysis, including the correlation between events observed in low and high layers of the reference model have been discussed.


Sign in / Sign up

Export Citation Format

Share Document