All Stories

  1. LL-XSS: End-to-End Generative Model-based XSS Payload Creation
  2. Employing Takaful Islamic Banking through State of the Art Blockchain: A Case Study
  3. Deep neural architectures for large scale android malware analysis
  4. Design and implementation of an attestation protocol for measured dynamic behavior
  5. TSSDroid: TSS API for the Android software stack
  6. Realization of a user-centric, privacy preserving permission framework for Android
  7. Transforming high-level requirements to executable policies for Android
  8. Towards a high-level trusted computing API for Android software stack
  9. Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace
  10. How secure is your smartphone: An analysis of smartphone security mechanisms
  11. A sense of others
  12. POAuth
  13. MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services
  14. Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
  15. Apex
  16. A Trustworthy Identity Management Architecture for e-Government Processes
  17. A trustworthy identity management architecture for e-government processes in Pakistan
  18. Identity Management System for Electronic Government Processes in Pakistan