Learn More
The Android platform lacks tools for assessing and monitoring apps in a systematic way. This lack of tools is particularly problematic when combined with the open nature of Google Play, the main app distribution channel. As our key contribution, we design and implement ProfileDroid, a comprehensive, multi-layer system for monitoring and profiling apps. Our(More)
Android uses a system of permissions to control how apps access sensitive devices and data stores. Unfortunately, we have little understanding of the evolution of Android permissions since their inception (2008). <i>Is the permission model allowing the Android platform and apps to become more secure?</i> In this paper, we present arguably the first(More)
In this paper, we study the intertwined propagation of two competing “memes” (or data, rumors, etc.) in a composite network. Within the constraints of this scenario, we ask two key questions: (a) which meme will prevail? and (b) can one influence the outcome of the propagations? Our model is underpinned by two key concepts, a structural graph model(More)
If a false rumor propagates via Twitter, while the truth propagates between friends in Facebook, which one will prevail? This question captures the essence of the problem we address here. We study the intertwined propagation of two competing "memes" (or viruses, rumors, products etc.) in a composite network. A key novelty is the use of a composite network,(More)
Android applications are used in a variety of domains, including business, social, media, health, scientific, and even military. On one hand, enterprises can take advantage of the richness of Android applications to support their business needs. On the other hand, Android devices contain rich sensitive data - e.g., GPS location, photos, calendar, contacts,(More)
Detecting botnets is a critical need for securing one's network and the Internet at large. Despite significant efforts, the problem of botnet detection is still unresolved, especially, when one wants to detect: (a) decentralized or peer-to-peer botnets, (b) botnets that are in a non-active period known as the &#x201C;Waiting&#x201D; stage, and (c)(More)
The Bring-Your-Own-Handheld-device (BYOH) phenomenon continues to make inroads as more people bring their own handheld devices to work or school. While convenient to device owners, this trend presents novel management challenges to network administrators as they have no control over these devices and no solid understanding of the behavior of these emerging(More)
The virtualization of both servers and substrate networks is a promising technique that will enable the future Internet architecture to support a variety of cloud computing services and architectures. The problem of efficiently mapping a virtual infrastructure (VI) over a wide-area optical network is a key problem in provisioning Infrastructure (and(More)