1. An adversary model to evaluate drm protection of video contents on ios devices;D’Orazio;Comput. Secur.,2016
2. Circumventing ios security mechanisms for apt forensic investigations: A security taxonomy for cloud apps;DOrazio;Future Gener. Comput. Syst.,2016
3. A technique to circumvent ssl/tls validations on ios devices;DOrazio;Future Gener. Comput. Syst.,2016
4. A Markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps;D’Orazio;Appl. Math. Comput.,2017
5. C.J. DOrazio, K.-K.R. Choo, L.T. Yang, Data exfiltration from Internet of things devices: ios devices as case studies.