-
1
-
-
79961058999
-
-
Android Market. http://www.android.com/market/.
-
-
-
-
2
-
-
84888998912
-
-
Android permissions. http://android.git.kernel.org/?p=platform/ frameworks/base.git;a=blob;f=core/res/AndroidManifest.xml.
-
Android Permissions
-
-
-
3
-
-
79961033561
-
-
iPhone App Store. http://www.apple.com/iphone/apps-for-iphone/.
-
-
-
-
4
-
-
79961063352
-
-
MobiStealth. http://www.mobistealth.com/.
-
-
-
-
8
-
-
10944267118
-
Static analysis for security
-
DOI 10.1109/MSP.2004.111
-
B. Chess and G. McGraw. Static analysis for security. Security & Privacy, IEEE, 2(6):76-79, 2004. (Pubitemid 40010916)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 76-79
-
-
Chess, B.1
Mcgraw, G.2
-
9
-
-
0003437009
-
-
Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
W. Cheswick, S. Bellovin, and A. Rubin. Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2003.
-
(2003)
Firewalls and Internet Security: Repelling the Wily Hacker
-
-
Cheswick, W.1
Bellovin, S.2
Rubin, A.3
-
10
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
ACM
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazieres, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proc. of the 20th ACM Symposium on Operating Systems Principles, pages 17-30. ACM, 2005.
-
(2005)
Proc. of the 20th ACM Symposium on Operating Systems Principles
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazieres, D.7
Kaashoek, F.8
Morris, R.9
-
11
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacymonitoring on smartphones
-
W. Enck, P. Gilbert, B.-g. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacymonitoring on smartphones. In Proc. of the USENIXSymposium on Operating Systems Design andImplementation (OSDI), Vancouver, October 2010.
-
Proc. of the USENIXSymposium on Operating Systems Design and Implementation (OSDI), Vancouver, October 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
14
-
-
60049085302
-
Understanding Android security
-
W. Enck, M. Ongtang, and P. McDaniel.Understanding Android security. IEEE Security andPrivacy, 7(1):50-57, 2009.
-
(2009)
IEEE Security AndPrivacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
17
-
-
79961083045
-
-
IMDb. IMDb Movies & TV. http://www.androlib.com/android.application. com-imdb-mobile-jzEzw.aspx.
-
-
-
-
18
-
-
50049083384
-
Preventing cross site request forgery attacks
-
IEEE
-
N. Jovanovic, E. Kirda, and C. Kruegel. Preventing cross site request forgery attacks. In Securecomm and Workshops, 2006, pages 1-10. IEEE, 2006.
-
(2006)
Securecomm and Workshops, 2006
, pp. 1-10
-
-
Jovanovic, N.1
Kirda, E.2
Kruegel, C.3
-
19
-
-
57749192483
-
Informationflow control for standard OS abstractions
-
ACM
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. Kaashoek, E. Kohler, and R. Morris. Informationflow control for standard OS abstractions. In Proc. of 21st ACM SIGOPS Symposium on Operating Systems Principles, pages 321-334. ACM, 2007.
-
(2007)
Proc. of 21st ACM SIGOPS Symposium on Operating Systems Principles
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.5
Kohler, E.6
Morris, R.7
-
20
-
-
79961070238
-
-
H. Lee. Nationwide bus. http://www.androlib.com/android.application.net- hyeongkyu-android-incheonbus-Eqwq.aspx.
-
Nationwide Bus
-
-
Lee, H.1
-
21
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
USENIX Association
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proc. of the 14th Conference on USENIX Security Symposium, pages 18-18. USENIX Association, 2005.
-
(2005)
Proc. of the 14th Conference on USENIX Security Symposium
, pp. 18-18
-
-
Livshits, V.B.1
Lam, M.S.2
-
22
-
-
34547408485
-
Measuring the attack surfaces of two FTP daemons
-
ACM
-
P. Manadhata, J. Wing, M. Flynn, and M. McQueen. Measuring the attack surfaces of two FTP daemons. In Proc. of the 2nd ACM Workshop on Quality of Protection, pages 3-10. ACM, 2006.
-
(2006)
Proc. of the 2nd ACM Workshop on Quality of Protection
, pp. 3-10
-
-
Manadhata, P.1
Wing, J.2
Flynn, M.3
McQueen, M.4
-
27
-
-
0002946830
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3-17, 2000.
-
(2000)
Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
28
-
-
84888352157
-
Making information flow explicit in HiStar
-
USENIX Association
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proc. of the 7th Symposium on Operating Systems Design and Implementation, pages 263-278. USENIX Association, 2006.
-
(2006)
Proc. of the 7th Symposium on Operating Systems Design and Implementation
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|