All Stories

  1. Deep neural architectures for large scale android malware analysis
  2. Design and implementation of an attestation protocol for measured dynamic behavior
  3. TSSDroid: TSS API for the Android software stack
  4. Realization of a user-centric, privacy preserving permission framework for Android
  5. Transforming high-level requirements to executable policies for Android
  6. Towards a high-level trusted computing API for Android software stack
  7. Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace
  8. How secure is your smartphone: An analysis of smartphone security mechanisms
  9. A sense of others
  10. POAuth
  11. MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services
  12. Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
  13. Apex
  14. A Trustworthy Identity Management Architecture for e-Government Processes
  15. A trustworthy identity management architecture for e-government processes in Pakistan
  16. Identity Management System for Electronic Government Processes in Pakistan