User profiles for David Sounthiraraj
David SounthirarajPrincipal Engineer, Cisco Systems Verified email at cisco.com Cited by 475 |
[PDF][PDF] Systems and methods for automated detection of application vulnerabilities
(57) ABSTRACT Disclosed are systems and methods for performing automatic, large-scale
analysis mobile applications to determine and analyze application vulnerability. The …
analysis mobile applications to determine and analyze application vulnerability. The …
[PDF][PDF] Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps
D Greenwood, ZLL Khan - Network and Distributed System …, 2014 - lilicoding.github.io
Many Android apps use SSL/TLS to transmit sensitive information securely. However,
developers often provide their own implementation of the standard SSL/TLS certificate validation …
developers often provide their own implementation of the standard SSL/TLS certificate validation …
An Experiential Security Assessment For Weaknesses In Indian Mobile Loan Apps After India Busted A Multi-Crore Loan App Scam.
As the globe increasingly focuses on mobility and digitalization, India's digital banking sector
is poised for development. At the same time, cybersecurity seems to have taken a back seat…
is poised for development. At the same time, cybersecurity seems to have taken a back seat…
Modelling analysis and auto-detection of cryptographic misuse in android applications
S Shuai, D Guowei, G Tao… - 2014 IEEE 12th …, 2014 - ieeexplore.ieee.org
Cryptographic misuse affects a sizeable portion of Android applications. However, there is
only an empirical study that has been made about this problem. In this paper, we perform a …
only an empirical study that has been made about this problem. In this paper, we perform a …
An android vulnerability detection system
J Zhang, Y Yao, X Li, J Xie, G Wu - … NSS 2017, Helsinki, Finland, August 21 …, 2017 - Springer
Android system versions update and iterate frequently with severe fragmentation. The
distribution of the various Android versions’ market share is scattered, making system-level …
distribution of the various Android versions’ market share is scattered, making system-level …
Man-in-the-middle-attack: Understanding in simple words
A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
… Sounthiraraj et al.,2014 conducted researches about HTTP security and those researches
found MITM as a very serious threat and those also discussed about the prevention …
found MITM as a very serious threat and those also discussed about the prevention …
Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications
Developing secure Internet of Things (IoT) applications that are free of vulnerabilities and
resilient against exploit is desirable for software developers and testers. In this paper, we …
resilient against exploit is desirable for software developers and testers. In this paper, we …
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
We present a new approach to static analysis for security vetting of Android apps and a general
framework called Amandroid. Amandroid determines points-to information for all objects …
framework called Amandroid. Amandroid determines points-to information for all objects …
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys
C Shaik - International Journal of Network Security & Its …, 2021 - papers.ssrn.com
… In 2014, Sounthiraraj et al discovered that many Android apps are vulnerable to SSL/TLS
manin-the-middle attacks. They presented a system called SMV-HUNTER to automatically …
manin-the-middle attacks. They presented a system called SMV-HUNTER to automatically …
CryptoShield-Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
F Draschbacher, J Feichtner - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
… [13], which we adapted to our crypto rules and augmented with concepts from Sounthiraraj
et al. [18] for improved detection of TLS issues. CryLogger runs applications in an Android …
et al. [18] for improved detection of TLS issues. CryLogger runs applications in an Android …