Withthe increasing functionality of intelligent programmable controllers and the continuous improvement in power and component density, the problem of rapidly rising temperatures during operation has become increasin...
详细信息
Social media has grown significantly since the early days. During this time, social media has grown to be a mainstay in most teenagers' lives. Whether they are on Facebook, Snapchat, X (formerly Twitter), or TikTo...
详细信息
ISBN:
(纸本)9781914587962;9781914587979
Social media has grown significantly since the early days. During this time, social media has grown to be a mainstay in most teenagers' lives. Whether they are on Facebook, Snapchat, X (formerly Twitter), or TikTok, teenagers have fully integrated social media into their lives. Teens tend to post the ins and outs of their lives, sharing sensitive information about themselves to people they know, but also to strangers. Although social media can be used for good, it can also be used by nefarious threat actors to take advantage of teenagers. Social engineers count on their subject's desire to increase the number of virtual connections, which may increase the endorphin response received when they get "likes". As such, social engineers create targeting accounts and then try to get as many people to accept them as possible. this increased footprint levitates the chances of a successful social engineering attack. Add to this, when someone shares an abundance of information about themselves, social engineers use this information to target individuals with spear phishing attacks. To further exacerbate the situation, social media uses algorithms to target its users and feed them with a significant amount of information that is not always vetted as being truthful. When someone is influenced by disinformation, it increases their susceptibility by taking away their desire to verify the truth, but rather accept that what they are being told is the truth. this case study examines the dynamics associated with teenagers and their susceptibility to becoming a victim of cybercrime and how social media perpetuates this situation.
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649479
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial Data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive Data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
the Android ecosystem is significantly challenged by fragmentation, arising from diverse system versions, device specifications, and manufacturer customizations. the growing divergence among devices leads to marked va...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
the Android ecosystem is significantly challenged by fragmentation, arising from diverse system versions, device specifications, and manufacturer customizations. the growing divergence among devices leads to marked variations in how a given app behaves across diverse devices. this is referred to as device-specific behaviors. Fragmentation not only complicates development processes but also impacts the overall industry by increasing maintenance costs and potentially harming user experience due to inconsistent app performance. In this work, we present the first large-scale empirical study of device-specific behaviors in real-world Android apps. We have designed a three-phase static analysis framework to accurately detect and understand the device-specific behaviors. Upon employing our tool on a dataset comprising more than 20,000 apps, we detected device-specific behaviors in 2,357 of them. By examining the distribution of device-specific behaviors, our analysis revealed that apps within the Chinese third-party app market exhibit more such behaviors compared to their counterparts in Google Play. Additionally, these behaviors are more likely to feature dominant brands that hold larger market shares. Reflecting this, we have classified these device-specific behaviors into 29 categories based on the functionalities implemented, providing a structured insight that is crucial for developers and stakeholders in the industry. Beyond the common behaviors, such as issue fixes and feature adaptations, we have observed 33 aggressive apps, including popular ones with millions of downloads. these apps abuse system properties of customized ROMs to obtain user-unresettable identifiers without requiring any permissions, posing significant privacy risks. Finally, we investigated the origins of device-specific behaviors, highlighting the significant challenges developers encounter in implementing them comprehensively. Our research aims to inform and equip industry practitioners with kn
software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro...
详细信息
Team composition is a critical factor influencing collaboration within agile software development. this study investigates the impact of gender distribution on teamwork quality in softwareengineering capstone courses...
详细信息
ISBN:
(纸本)9783031611537;9783031611544
Team composition is a critical factor influencing collaboration within agile software development. this study investigates the impact of gender distribution on teamwork quality in softwareengineering capstone courses. We examined the experiences of 240 students organized into 40 teams during an agile project course. We analyzed two surveys, one conducted before team composition and one at the end of the project work. As much as 91% of the students chose to use the practice of conducting stand-up meetings in their project work and the majority were satisfied withthe practice. Further, our analysis reveals that while women tend to engage more in design and men in programming, an increase in the proportion of women within a team correlates with a higher involvement of women in programming tasks. Our findings highlight gender differences in perceptions and experiences related to project involvement in agile softwareengineering courses.
Access to new technologies in the educational process and developing digital competences enabling critical and responsible use of digital technologies, including future professional work is a challenge for universitie...
详细信息
University-level softwareengineering education faces the challenge of providing both fundamental concepts while delivering to their students the latest trend in tools and practices. However, softwareengineering prog...
详细信息
Withthe increased focus and importance placed on the twin green and digital transition, also the development of digital products and software systems must take environmental sustainability into account. At present, t...
详细信息
ISBN:
(纸本)9798331505295;9798331505288
Withthe increased focus and importance placed on the twin green and digital transition, also the development of digital products and software systems must take environmental sustainability into account. At present, the environmental impact of software systems has gained more and more attention from boththe software development and the software procurement side. Researchers have provided many conceptual models of green software, but there is a lack of comprehensive, contemporary models to cover the overall picture, the whole life cycle of software. Aim of this study is to present the Green software Life Cycle (GSLC) model that incorporates sustainable practices and metrics. the model is formed by gathering promising practices and metrics from the existing body of knowledge and mapping them to the software life cycle phases. the theoretical model is then validated by interviewing software practitioners. the model encompasses the whole software life cycle, and should provide inspiration for not only to the software developers, but to all stakeholders who are participating the software life cycle and aim for more environmentally sustainable digital products. Although the GSLC model provides a starting point towards making the software life cycle greener, further refinement and empirical validation is necessary in the future.
Code cloning is a prevalent practice in software development, frequently exploited by adversaries to propagate malicious code, compromising user security and privacy. Recently proposed detection techniques often fail ...
详细信息
暂无评论