User profiles for David Sounthiraraj

David Sounthiraraj

Principal Engineer, Cisco Systems
Verified email at cisco.com
Cited by 475

[PDF][PDF] Systems and methods for automated detection of application vulnerabilities

…, BM Thuraisingham, LR Khan, J Sahs, D Sounthiraraj… - 2018 - repositories.lib.utexas.edu
(57) ABSTRACT Disclosed are systems and methods for performing automatic, large-scale
analysis mobile applications to determine and analyze application vulnerability. The …

[PDF][PDF] Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps

D Greenwood, ZLL Khan - Network and Distributed System …, 2014 - lilicoding.github.io
Many Android apps use SSL/TLS to transmit sensitive information securely. However,
developers often provide their own implementation of the standard SSL/TLS certificate validation …

An Experiential Security Assessment For Weaknesses In Indian Mobile Loan Apps After India Busted A Multi-Crore Loan App Scam.

SS Majeti, B Janet, NP Dhavale - Webology, 2022 - search.ebscohost.com
As the globe increasingly focuses on mobility and digitalization, India's digital banking sector
is poised for development. At the same time, cybersecurity seems to have taken a back seat…

Modelling analysis and auto-detection of cryptographic misuse in android applications

S Shuai, D Guowei, G Tao… - 2014 IEEE 12th …, 2014 - ieeexplore.ieee.org
Cryptographic misuse affects a sizeable portion of Android applications. However, there is
only an empirical study that has been made about this problem. In this paper, we perform a …

An android vulnerability detection system

J Zhang, Y Yao, X Li, J Xie, G Wu - … NSS 2017, Helsinki, Finland, August 21 …, 2017 - Springer
Android system versions update and iterate frequently with severe fragmentation. The
distribution of the various Android versions’ market share is scattered, making system-level …

Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
Sounthiraraj et al.,2014 conducted researches about HTTP security and those researches
found MITM as a very serious threat and those also discussed about the prevention …

Iotverif: An automated tool to verify ssl/tls certificate validation in android mqtt client applications

K Alghamdi, A Alqazzaz, A Liu, H Ming - Proceedings of the Eighth ACM …, 2018 - dl.acm.org
Developing secure Internet of Things (IoT) applications that are free of vulnerabilities and
resilient against exploit is desirable for software developers and testers. In this paper, we …

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps

F Wei, S Roy, X Ou, Robby - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
We present a new approach to static analysis for security vetting of Android apps and a general
framework called Amandroid. Amandroid determines points-to information for all objects …

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys

C Shaik - International Journal of Network Security & Its …, 2021 - papers.ssrn.com
… In 2014, Sounthiraraj et al discovered that many Android apps are vulnerable to SSL/TLS
manin-the-middle attacks. They presented a system called SMV-HUNTER to automatically …

CryptoShield-Automatic On-Device Mitigation for Crypto API Misuse in Android Applications

F Draschbacher, J Feichtner - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
… [13], which we adapted to our crypto rules and augmented with concepts from Sounthiraraj
et al. [18] for improved detection of TLS issues. CryLogger runs applications in an Android …