Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic environments, and facilitating interactions across heterogeneous domains. Accordingly, assessing the security thereof is a pressing need, yet requires high levels of scalability and reliability to handle the dynamism involved in such volatile ecosystems. This dissertation seeks to enhance conventional security detection methods to cope with the emergent features of contemporary software ecosystems. In particular, it analyzes the security of Android and IoT ecosystems by developing rigorous vulnerability detection methods. A critical aspect of this work is the focus on detec...
peer reviewedIn widely used mobile operating systems a single vulnerability can threaten the securit...
abstract: Smartphones are pervasive nowadays. They are supported by mobile platforms that allow user...
The growing market of the mobile application is overtaking the web application. Mobile application d...
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) p...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology acce...
Mobile app poses both traditional and new potential threats to system security and user privacy. The...
The Internet of Things (IoT) integrates a wide range of devices into a network to provide intelligen...
Over time, the increasing popularity of the Android operating system (OS) has resulted in its user-b...
With the increasing complexity of application software there is an acute need for software analysis ...
The rising ubiquity of the Internet of Things (IoT) has heralded a new era of increasingly prolific ...
The number of malicious mobile and android based application targeting Android users and their smart...
Currently, smart phones are becoming indispensable for meeting the social expectation ofalways stayi...
Thesis (M.S.)--Boston UniversityAndroid is a major mobile operating system pre-installed and shipped...
Android is the most popular mobile operating system among the most used touch devices. Today, 80 per...
peer reviewedIn widely used mobile operating systems a single vulnerability can threaten the securit...
abstract: Smartphones are pervasive nowadays. They are supported by mobile platforms that allow user...
The growing market of the mobile application is overtaking the web application. Mobile application d...
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) p...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology acce...
Mobile app poses both traditional and new potential threats to system security and user privacy. The...
The Internet of Things (IoT) integrates a wide range of devices into a network to provide intelligen...
Over time, the increasing popularity of the Android operating system (OS) has resulted in its user-b...
With the increasing complexity of application software there is an acute need for software analysis ...
The rising ubiquity of the Internet of Things (IoT) has heralded a new era of increasingly prolific ...
The number of malicious mobile and android based application targeting Android users and their smart...
Currently, smart phones are becoming indispensable for meeting the social expectation ofalways stayi...
Thesis (M.S.)--Boston UniversityAndroid is a major mobile operating system pre-installed and shipped...
Android is the most popular mobile operating system among the most used touch devices. Today, 80 per...
peer reviewedIn widely used mobile operating systems a single vulnerability can threaten the securit...
abstract: Smartphones are pervasive nowadays. They are supported by mobile platforms that allow user...
The growing market of the mobile application is overtaking the web application. Mobile application d...