-
1
-
-
80755182862
-
-
enterproid. http://www.enterproid.com/.
-
enterproid
-
-
-
3
-
-
78650729520
-
The VMware mobile virtualization platform: Is that a hypervisor in your pocket?
-
K. Barr, P. Bungale, S. Deasy, V. Gyuris, P. Hung, C. Newell, H. Tuch, and B. Zoppis. The VMware mobile virtualization platform: is that a hypervisor in your pocket? SIGOPS Operating Systems Review, 2010.
-
(2010)
SIGOPS Operating Systems Review
-
-
Barr, K.1
Bungale, P.2
Deasy, S.3
Gyuris, V.4
Hung, P.5
Newell, C.6
Tuch, H.7
Zoppis, B.8
-
5
-
-
80755167433
-
-
Technical Report TR-2011-04, Technische Universität Darmstadt
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Universität Darmstadt, 2011.
-
(2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
12
-
-
77954970860
-
Trusted Virtual Domains { design, implementation and lessons learned
-
A. Dmitrienko, K. Eriksson, D. Kuhlmann, G. Ramunno, A.-R. Sadeghi, S. Schulz, M. Schunter, M. Winandy, L. Catuogno, and J. Zhan. Trusted Virtual Domains { design, implementation and lessons learned. In INTRUST, 2009.
-
(2009)
INTRUST
-
-
Dmitrienko, A.1
Eriksson, K.2
Kuhlmann, D.3
Ramunno, G.4
Sadeghi, A.-R.5
Schulz, S.6
Schunter, M.7
Winandy, M.8
Catuogno, L.9
Zhan, J.10
-
14
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
-
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
17
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security Symposium, 2011.
-
USENIX Security Symposium, 2011
-
-
Felt, A.P.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
18
-
-
80755164279
-
-
Gartner Inc. http://www.gartner.com/it/page.jsp?id=1689814, 2011.
-
(2011)
-
-
-
21
-
-
84885884258
-
-
Google Inc.
-
Google Inc. Google Android. http://www.android.com/.
-
Google Android
-
-
-
23
-
-
51949098506
-
Xen on ARM: System virtualization using Xen hypervisor for ARM-based secure mobile phones
-
Jan.
-
J.-Y. Hwang, S.-B. Suh, S.-K. Heo, C.-J. Park, J.-M. Ryu, S.-Y. Park, and C.-R. Kim. Xen on ARM: System virtualization using Xen hypervisor for ARM-based secure mobile phones. In IEEE CCNC, Jan. 2008.
-
(2008)
IEEE CCNC
-
-
Hwang, J.-Y.1
Suh, S.-B.2
Heo, S.-K.3
Park, C.-J.4
Ryu, J.-M.5
Park, S.-Y.6
Kim, C.-R.7
-
24
-
-
79251558865
-
These aren't the permissions you're looking for
-
A. Lineberry, D. L. Richardson, and T. Wyatt. These aren't the permissions you're looking for. BlackHat USA 2010. http://dtors.files.wordpress. com/ 2010/08/blackhat-2010-slides.pdf, 2010.
-
(2010)
BlackHat USA 2010
-
-
Lineberry, A.1
Richardson, D.L.2
Wyatt, T.3
-
26
-
-
33845953872
-
-
National Security Agency. Security-Enhanced Linux. http://www.nsa.gov/ research/selinux.
-
Security-Enhanced Linux
-
-
-
27
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android permission model and enforcement with user-defined runtime constraints. In ACM ASIACCS, 2010.
-
(2010)
ACM ASIACCS
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
28
-
-
84860533481
-
Beyond kernel-level integrity measurement: Enabling remote attestation for the Android platform
-
M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert. Beyond kernel-level integrity measurement: Enabling remote attestation for the Android platform. In TRUST, 2010.
-
(2010)
TRUST
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
Seifert, J.-P.4
-
29
-
-
80755124462
-
Building Android sandcastles in Android's sandbox
-
Nils
-
Nils. Building Android sandcastles in Android's sandbox. BlackHat Abu Dhabi 2010. https://media.blackhat.com/bh-ad-10/Nils/Black- Hat-AD-2010-android- sandcastle-wp.pdf, 2010.
-
(2010)
BlackHat Abu Dhabi 2010
-
-
-
30
-
-
80755167439
-
Android Hax
-
J. Oberheide. Android Hax. SummerCon 2010. http://jon.oberheide.org/ files/summercon10-androidhax-jonoberheide.pdf, 2010.
-
(2010)
SummerCon 2010
-
-
Oberheide, J.1
-
31
-
-
78751555807
-
Porscha: Policy oriented secure content handling in Android
-
M. Ongtang, K. Butler, and P. McDaniel. Porscha: Policy oriented secure content handling in Android. In ACSAC, 2010.
-
(2010)
ACSAC
-
-
Ongtang, M.1
Butler, K.2
McDaniel, P.3
-
33
-
-
80755167445
-
-
Open Kernel Labs. Ok:android. http://www.ok-labs.com/products/ok-android.
-
Ok:android
-
-
-
34
-
-
79251587269
-
-
Palm Source, Inc. Version 1
-
Palm Source, Inc. Open Binder. Version 1. http://www.angryredplanet.com/ ~hackbod/ openbinder/docs/html/index.html, 2005.
-
(2005)
Open Binder
-
-
-
37
-
-
79959466110
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In 18th Annual Network and Distributed System Security Conference (NDSS), 2011.
-
18th Annual Network and Distributed System Security Conference (NDSS), 2011
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
38
-
-
85072933898
-
Adapting software fault isolation to contemporary CPU architectures
-
D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko, K. Schimpf, B. Yee, and B. Chen. Adapting software fault isolation to contemporary CPU architectures. In USENIX Security Symposium, 2010.
-
USENIX Security Symposium, 2010
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
41
-
-
77954722817
-
M-Shield mobile security technology
-
J. Srage and J. Azema. M-Shield mobile security technology, 2005. TI White paper. http://focus.ti. com/pdfs/wtbu/ti-mshield-whitepaper.pdf.
-
(2005)
TI White Paper
-
-
Srage, J.1
Azema, J.2
-
42
-
-
79959402881
-
-
Trusted Computing Group. Version 1.0 Revision 6, 26 June
-
Trusted Computing Group. Mobile Trusted Module Specification. Version 1.0 Revision 6, 26 June 2008.
-
(2008)
Mobile Trusted Module Specification
-
-
-
43
-
-
77649301801
-
-
Trusted Computing Group (TCG). Version 1.4, Revision 4
-
Trusted Computing Group (TCG). TNC Architecture for Interoperability, Version 1.4, Revision 4, 2009.
-
(2009)
TNC Architecture for Interoperability
-
-
|