Learn More
Android uses a system of permissions to control how apps access sensitive devices and data stores. Unfortunately, we have little understanding of the evolution of Android permissions since their inception (2008). <i>Is the permission model allowing the Android platform and apps to become more secure?</i> In this paper, we present arguably the first(More)
If a false rumor propagates via Twitter, while the truth propagates between friends in Facebook, which one will prevail? This question captures the essence of the problem we address here. We study the intertwined propagation of two competing "memes" (or viruses, rumors, products etc.) in a composite network. A key novelty is the use of a composite network,(More)
The Android platform lacks tools for assessing and monitoring apps in a systematic way. This lack of tools is particularly problematic when combined with the open nature of Google Play, the main app distribution channel. As our key contribution, we design and implement ProfileDroid, a comprehensive, multi-layer system for monitoring and profiling apps. Our(More)
— In this paper, we study the intertwined propagation of two competing " memes " (or data, rumors, etc.) in a composite network. Within the constraints of this scenario, we ask two key questions: (a) which meme will prevail? and (b) can one influence the outcome of the propagations? Our model is underpinned by two key concepts, a structural graph model(More)
With the development of WDM techniques and cloud computing, incorporating the optical backbone into data centers has received extensive attention. Virtual network (VN) planning has been proposed for this new networking paradigm by taking advantage of network virtualization. VN planning is essentially a united virtualization of optical and server resources(More)
Detecting botnets is a critical need for securing one's network and the Internet at large. Despite significant efforts, the problem of botnet detection is still unresolved, especially, when one wants to detect: (a) decentralized or peer-to-peer botnets, (b) botnets that are in a non-active period known as the &#x201C;Waiting&#x201D; stage, and (c)(More)
Android applications are used in a variety of domains, including business, social, media, health, scientific, and even military. On one hand, enterprises can take advantage of the richness of Android applications to support their business needs. On the other hand, Android devices contain rich sensitive data - e.g., GPS location, photos, calendar, contacts,(More)
The virtualization of both servers and substrate networks is a promising technique that will enable the future Internet architecture to support a variety of cloud computing services and architectures. The problem of efficiently mapping a virtual infrastructure (VI) over a wide-area optical network is a key problem in provisioning Infrastructure (and(More)