Keyphrases
Vulnerability
100%
Symbolic Execution
71%
Exploit Generation
63%
Vulnerability Detection
63%
Vulnerability Exploitation
63%
Android Framework
63%
System Services
48%
DRAM chips
42%
Internet of Things Devices
37%
Cyber-physical
31%
Encryption
31%
Attack Graph
31%
Internet of Things Security
31%
Emulation
31%
Cyber Space
31%
Internet of Things Platform
31%
Execution Environment
31%
Internet of Things System
31%
Mobile Devices
31%
Dependency Graph
31%
Hypervisor
31%
Data Leakage Prevention
31%
Firmware
31%
Sandboxing
31%
Business Process
31%
Threat Model
31%
Emulator
31%
Runtime Systems
31%
Impact on Business
31%
Service Calls
31%
Physical Space
31%
Cyber-attacks
29%
Dynamic Analysis
26%
Normal Worlds
21%
Critical Security
21%
Secure World
21%
Android Devices
20%
Android Application
19%
Enterprise Network
19%
Decrypt
18%
Smartphone
18%
Ciphertext
18%
Privilege Separation
15%
Cyberspace
15%
Microcontroller
15%
IoT Devices
15%
Intra Mode
15%
User Security
12%
Application Framework
12%
Middleware
12%
Computer Science
Android
85%
Symbolic Execution
74%
Dynamic Analysis
31%
Physical Memory
31%
Data Structure
31%
Mobile Device
31%
Hypervisor
31%
Business Process
31%
Data Leakage Prevention
31%
Dependency Graph
31%
Threat Model
31%
Microcontroller
21%
Protect Sensitive Data
21%
Android Application
18%
Communication Technique
15%
Security Mechanism
15%
Enterprise Network
15%
Big Data
15%
Data Security
15%
Real-Time Operating System
15%
personalized service
15%
High-Performance Computing
15%
Cyber Attack
14%
Ciphertext
10%
Static Program Analysis
10%
Analysis Technique
10%
Business Person
10%
System on a Chip
10%
Cold Boot Attack
10%
Mobile Environment
10%
Audio Recording
10%
Malware
10%
Computer System
10%
Memory Content
10%
Sensitive Object
10%
Security Breach
10%
Filesystems
10%
Malicious Apps
10%
Device Emulator
10%
Data Source
10%
Security Concern
10%
Steganography
10%
Priori Knowledge
10%
Effective Approach
10%
Security and Privacy
9%
System Resource
9%
Application Framework
9%