Keyphrases
Android Application
19%
Android Devices
20%
Android Framework
63%
Attack Graph
31%
Bug Patterns
31%
Business Process
31%
Ciphertext
18%
Critical Security
21%
Cyber Space
31%
Cyber-attacks
29%
Cyber-physical
31%
Cyberspace
15%
Data Leakage Prevention
31%
Decrypt
18%
Dependency Graph
31%
DRAM chips
42%
Dynamic Analysis
26%
Emulation
31%
Emulator
31%
Encryption
31%
Enterprise Network
19%
Execution Environment
31%
Exploit Generation
63%
Firmware
31%
Hypervisor
31%
Impact on Business
31%
Internet of Things Devices
37%
Internet of Things Platform
31%
Internet of Things Security
31%
Internet of Things System
31%
Intra Mode
15%
IoT Devices
15%
Memory Bugs
15%
Microcontroller
15%
Mobile Devices
31%
Normal Worlds
21%
Physical Space
31%
Privilege Separation
15%
PyTorch
31%
Runtime Systems
31%
Sandboxing
31%
Secure World
21%
Service Calls
31%
Smartphone
18%
Symbolic Execution
71%
System Services
48%
Threat Model
31%
Vulnerability
100%
Vulnerability Detection
63%
Vulnerability Exploitation
63%
Computer Science
Analysis Technique
10%
Android
85%
Android Application
18%
Audio Recording
10%
Big Data
15%
Business Person
10%
Business Process
31%
Ciphertext
10%
Cold Boot Attack
10%
Communication Technique
15%
Comprehensive Examination
31%
Computer System
10%
Cyber Attack
14%
Data Leakage Prevention
31%
Data Security
15%
Data Structure
31%
Debugging Tool
31%
Dependency Graph
31%
Dynamic Analysis
31%
Enterprise Network
15%
Filesystems
10%
High-Performance Computing
15%
Hypervisor
31%
Information Storage
31%
Learning Framework
31%
Malicious Apps
10%
Malware
10%
Memory Content
10%
Memory Management
31%
Microcontroller
21%
Mobile Device
31%
Mobile Environment
10%
personalized service
15%
Physical Memory
31%
Protect Sensitive Data
21%
Quantitative Study
31%
Real-Time Operating System
15%
Security Breach
10%
Security Mechanism
15%
Sensitive Object
10%
Static Program Analysis
10%
Symbolic Execution
74%
System on a Chip
10%
Threat Model
31%