메뉴 건너뛰기




Volumn , Issue , 2010, Pages 347-356

Paranoid android: Versatile protection for smartphones

Author keywords

Android; decoupled security; smartphones

Indexed keywords

ANDROID (OPERATING SYSTEM); MICROCOMPUTERS; MOBILE SECURITY; VIRTUAL REALITY;

EID: 78751498804     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920313     Document Type: Conference Paper
Times cited : (282)

References (42)
  • 2
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • August
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proc. of Crypto'96, pages 1-15, August 1996.
    • (1996) Proc. of Crypto'96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 85170006918 scopus 로고    scopus 로고
    • BlackBerry, Inc. BlackBerry Enterprise Server. http://na.blackberry.com/ eng/services/business/server/full/.
    • BlackBerry Enterprise Server
  • 4
    • 35448979944 scopus 로고    scopus 로고
    • SmartSiren: Virus detection and alert for smartphones
    • June
    • J. Cheng, S. H. Wong, H. Yang, and S. Lu. SmartSiren: virus detection and alert for smartphones. In Proc. of MobiSys'07, pages 258-271, June 2007.
    • (2007) Proc. of MobiSys'07 , pp. 258-271
    • Cheng, J.1    Wong, S.H.2    Yang, H.3    Lu, S.4
  • 5
    • 70349145918 scopus 로고    scopus 로고
    • Decoupling dynamic program analysis from execution in virtual environments
    • June
    • J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In Proc. of USENIX'08, pages 1-14, June 2008.
    • (2008) Proc. of USENIX'08 , pp. 1-14
    • Chow, J.1    Garfinkel, T.2    Chen, P.M.3
  • 7
    • 84872706665 scopus 로고    scopus 로고
    • A. T. W. I. company
    • A. T. W. I. company. Top 500 global sites. http://www.alexa.com/topsites.
    • Top 500 Global Sites
  • 9
    • 84976713553 scopus 로고
    • Concurrent control with "readers" and "writers"
    • P. J. Courtois, F. Heymans, and D. L. Parnas. Concurrent control with "readers" and "writers". Commun. ACM, 14(10):667-668, 1971.
    • (1971) Commun. ACM , vol.14 , Issue.10 , pp. 667-668
    • Courtois, P.J.1    Heymans, F.2    Parnas, D.L.3
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 11
    • 84978401615 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • December
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proc. of OSDI'02, pages 211-224, December 2002.
    • (2002) Proc. of OSDI'02 , pp. 211-224
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 13
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proc. of CCS, pages 235-245, 2009.
    • (2009) Proc. of CCS , pp. 235-245
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 17
    • 0031099876 scopus 로고    scopus 로고
    • Reexamining the fault density component size connection
    • L. Hatton. Reexamining the fault density component size connection. Software, IEEE, 14(2):89-97, 1997.
    • (1997) Software, IEEE , vol.14 , Issue.2 , pp. 89-97
    • Hatton, L.1
  • 21
    • 76649138917 scopus 로고    scopus 로고
    • VirusMeter: Preventing your cellphone from spies
    • L. Liu, G. Yan, X. Zhang, and S. Chen. VirusMeter: Preventing your cellphone from spies. In Proc. of RAID, pages 244-264, 2009.
    • (2009) Proc. of RAID , pp. 244-264
    • Liu, L.1    Yan, G.2    Zhang, X.3    Chen, S.4
  • 22
    • 0034479192 scopus 로고    scopus 로고
    • Secure execution of java applets using a remote playground
    • D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. IEEE Trans. Softw. Eng., 26(12):1197-1209, 2000.
    • (2000) IEEE Trans. Softw. Eng. , vol.26 , Issue.12 , pp. 1197-1209
    • Malkhi, D.1    Reiter, M.K.2
  • 23
    • 67650824973 scopus 로고    scopus 로고
    • Capo: A software-hardware interface for practical deterministic multiprocessor replay
    • March
    • P. Montesinos, M. Hicks, S. T. King, and J. Torrellas. Capo: a software-hardware interface for practical deterministic multiprocessor replay. In Proc. of ASPLOS '09, pages 73-84, March 2009.
    • (2009) Proc. of ASPLOS '09 , pp. 73-84
    • Montesinos, P.1    Hicks, M.2    King, S.T.3    Torrellas, J.4
  • 26
    • 27544515395 scopus 로고    scopus 로고
    • BugNet: Continuously recording program execution for deterministic replay debugging
    • S. Narayanasamy, G. Pokam, and B. Calder. BugNet: Continuously recording program execution for deterministic replay debugging. SIGARCH Comput. Archit. News, 33(2):284-295, 2005.
    • (2005) SIGARCH Comput. Archit. News , vol.33 , Issue.2 , pp. 284-295
    • Narayanasamy, S.1    Pokam, G.2    Calder, B.3
  • 27
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of NDSS'05, February 2005.
    • Proc. of NDSS'05, February 2005
    • Newsome, J.1    Song, D.2
  • 33
    • 78751522051 scopus 로고    scopus 로고
    • I. PalmSource
    • I. PalmSource. OpenBinder. http://www.angryredplanet.com/~hackbod/ openbinder/docs/html/index.html, 2005.
    • (2005) OpenBinder
  • 37
    • 0001641893 scopus 로고    scopus 로고
    • RecPlay: A fully integrated practical record/replay system
    • M. Ronsse and K. De Bosschere. RecPlay: a fully integrated practical record/replay system. ACM Trans. Comput. Syst., 17(2):133-152, 1999.
    • (1999) ACM Trans. Comput. Syst. , vol.17 , Issue.2 , pp. 133-152
    • Ronsse, M.1    De Bosschere, K.2
  • 38
    • 0343782170 scopus 로고    scopus 로고
    • Replay for concurrent non-deterministic shared-memory applications
    • May
    • M. Russinovich and B. Cogswell. Replay for concurrent non-deterministic shared-memory applications. In Proc. of PLDI '96, pages 258-266, May 1996.
    • (1996) Proc. of PLDI '96 , pp. 258-266
    • Russinovich, M.1    Cogswell, B.2
  • 40
    • 74049104017 scopus 로고    scopus 로고
    • Ripley: Automatically securing web 2.0 applications through replicated execution
    • K. Vikram, A. Prateek, and B. Livshits. Ripley: automatically securing web 2.0 applications through replicated execution. In Proc. of CCS, pages 173-186, 2009.
    • (2009) Proc. of CCS , pp. 173-186
    • Vikram, K.1    Prateek, A.2    Livshits, B.3
  • 41
    • 27544498541 scopus 로고    scopus 로고
    • Defeating memory corruption attacks via pointer taintedness detection
    • June
    • J. Xu and N. Nakka. Defeating memory corruption attacks via pointer taintedness detection. In Proc. of DSN '05, pages 378-387, June 2005.
    • (2005) Proc. of DSN '05 , pp. 378-387
    • Xu, J.1    Nakka, N.2
  • 42
    • 0038684791 scopus 로고    scopus 로고
    • A "flight data recorder" for enabling full-system multiprocessor deterministic replay
    • M. Xu, R. Bodik, and M. D. Hill. A "flight data recorder" for enabling full-system multiprocessor deterministic replay. SIGARCH Comput. Archit. News, 31(2):122-135, 2003.
    • (2003) SIGARCH Comput. Archit. News , vol.31 , Issue.2 , pp. 122-135
    • Xu, M.1    Bodik, R.2    Hill, M.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.