Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
RARE: A Systematic Augmented Router Emulation for Malware Analysis
How can we analyze and profile the behavior of a router malware? This is the motivating question behind our work focusing on router. Router-specific malware has emerged as a new vector for hackers, but has rec...
-
Chapter and Conference Paper
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts
As we move into the mobile era, many functionalities in standard web services are being re-implemented in mobile apps and services, including many security-related functionalities. However, it has been observe...