메뉴 건너뛰기




Volumn , Issue , 2011, Pages 239-252

Analyzing inter-application communication in Android

Author keywords

Android; intents; message passing; mobile phone security

Indexed keywords

ANDROID; APPLICATION COMPONENTS; APPLICATION SECURITY; COMPONENT REUSE; END USERS; INTENTS; INTER-APPLICATION COMMUNICATIONS; MESSAGE PASSING SYSTEMS; OPEN API; SECURITY RISKS; SMART PHONES; USER DATA; USER PRIVACY;

EID: 79961035117     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1999995.2000018     Document Type: Conference Paper
Times cited : (719)

References (28)
  • 1
    • 79961058999 scopus 로고    scopus 로고
    • Android Market. http://www.android.com/market/.
  • 2
    • 84888998912 scopus 로고    scopus 로고
    • Android permissions. http://android.git.kernel.org/?p=platform/ frameworks/base.git;a=blob;f=core/res/AndroidManifest.xml.
    • Android Permissions
  • 3
    • 79961033561 scopus 로고    scopus 로고
    • iPhone App Store. http://www.apple.com/iphone/apps-for-iphone/.
  • 4
    • 79961063352 scopus 로고    scopus 로고
    • MobiStealth. http://www.mobistealth.com/.
  • 8
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • DOI 10.1109/MSP.2004.111
    • B. Chess and G. McGraw. Static analysis for security. Security & Privacy, IEEE, 2(6):76-79, 2004. (Pubitemid 40010916)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 76-79
    • Chess, B.1    Mcgraw, G.2
  • 17
    • 79961083045 scopus 로고    scopus 로고
    • IMDb. IMDb Movies & TV. http://www.androlib.com/android.application. com-imdb-mobile-jzEzw.aspx.
  • 20
    • 79961070238 scopus 로고    scopus 로고
    • H. Lee. Nationwide bus. http://www.androlib.com/android.application.net- hyeongkyu-android-incheonbus-Eqwq.aspx.
    • Nationwide Bus
    • Lee, H.1
  • 21
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • USENIX Association
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proc. of the 14th Conference on USENIX Security Symposium, pages 18-18. USENIX Association, 2005.
    • (2005) Proc. of the 14th Conference on USENIX Security Symposium , pp. 18-18
    • Livshits, V.B.1    Lam, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.