Al Rahat et al., 2019
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Al Rahat et al. | Oauthlint: An empirical study on oauth bugs in android applications | |
| Rahaman et al. | Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects | |
| Zuo et al. | Why does your data leak? uncovering the data leakage in cloud from mobile apps | |
| US9514300B2 (en) | Systems and methods for enhanced security in wireless communication | |
| Bhargavan et al. | Language-based defenses against untrusted browser origins | |
| Hernandez-Ardieta et al. | A taxonomy and survey of attacks on digital signatures | |
| Bianchi et al. | Exploitation and mitigation of authentication schemes based on device-public information | |
| Rahat et al. | Cerberus: Query-driven scalable vulnerability detection in oauth service provider implementations | |
| Wang et al. | One size does not fit all: Uncovering and exploiting cross platform discrepant {APIs} in {WeChat} | |
| Tao et al. | Opening a Pandora's box: things you should know in the era of custom GPTs | |
| Casati et al. | The dangers of rooting: data leakage detection in android applications | |
| Yang et al. | Breaking and fixing mobile app authentication with OAuth2. 0-based protocols | |
| Mishra et al. | Privacy protection framework for android | |
| Qin et al. | RIPTE: runtime integrity protection based on trusted execution for IoT device | |
| Almohri et al. | Process authentication for high system assurance | |
| Rahat et al. | Cerberus: Query-driven scalable security checking for OAuth service provider implementations | |
| Bhatt et al. | Etdi: Mitigating tool squatting and rug pull attacks in model context protocol (mcp) by using oauth-enhanced tool definitions and policy-based access control | |
| CN106971105B (en) | A defense method for iOS-based application encountering mask attack | |
| Zhang et al. | The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems | |
| Wei et al. | How far are app secrets from being stolen? a case study on android | |
| Niemi et al. | Platform attestation in consumer devices | |
| Ilonen et al. | Operating System Hardening Based on Privacy, Security and Performance: Customization of Microsoft Windows | |
| Vinay et al. | The Demonstration of Android Vulnerabilities | |
| Rahaman et al. | CHIRON: deployment-quality detection of Java cryptographic vulnerabilities | |
| Chang et al. | Vulnerable service invocation and countermeasures |