-
1
-
-
84866722938
-
-
March
-
DroidDream. http://www.androidpolice.com/2011/03/01/the-mot her-of-all-android-malware-has-arrived-stole n-apps-released-to-the-market-that- root-you r-phone-steal-your-data-and-open-backdoor/, March 2011.
-
(2011)
DroidDream
-
-
-
2
-
-
80755182876
-
-
June
-
Genode OS Framework. http://genode.org, June 2011.
-
(2011)
-
-
-
4
-
-
72249120603
-
seL4: Formal Verification of an OS Kernel
-
ACM
-
G. KLEIN, K. ELPHINSTONE, G. HEISER, J. ANDRONICK, D. COCK, P. DERRIN, D. ELKADUWE, K. ENGELHARDT, R. KOLANSKI, M. NORRISH, T. SEWELL, H. TUCH AND H. WINWOOD. seL4: Formal Verification of an OS Kernel. In ACM Symposium on Operating System Principles (2009), ACM, pp. 207-220.
-
ACM Symposium on Operating System Principles (2009)
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, H.13
-
9
-
-
78650729520
-
The vmware mobile virtualization platform: Is that a hypervisor in your pocket?
-
December
-
BARR, K., BUNGALE, P., DEASY, S., GYURIS, V., HUNG, P., NEWELL, C., TUCH, H., AND ZOPPIS, B. The vmware mobile virtualization platform: is that a hypervisor in your pocket? SIGOPS Oper. Syst. Rev. 44 (December 2010), 124-135.
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.44
, pp. 124-135
-
-
Barr, K.1
Bungale, P.2
Deasy, S.3
Gyuris, V.4
Hung, P.5
Newell, C.6
Tuch, H.7
Zoppis, B.8
-
10
-
-
80755167461
-
-
June Bachelor's Thesis, Security in Telecommunications, Technische Universität Berlin
-
C. LUDWIG. Porting OpenBSD to Fiasco. http://www.isti.tu-berlin.de/ fileadmin/fg214/fi nished-theses/cludwig/OpenBSDonFiasco.pdf, June 2011. Bachelor's Thesis, Security in Telecommunications, Technische Universität Berlin.
-
(2011)
Porting OpenBSD to Fiasco
-
-
Ludwig, C.1
-
14
-
-
80755167460
-
-
COVERITY INC. Coverity Scan 2010 Open Source Integrity Report. http://www.coverity.com/html/pr ess/coverity-scan-2010-report-reveals-high-ris k-software-flaws-in-android.html, 2010.
-
(2010)
Coverity Scan 2010 Open Source Integrity Report
-
-
-
15
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
ACM
-
D. BARRERA, H. G. KAYACIK, P. C. VAN OORSCHOT AND A. SOMAYAJI. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security (New York, NY, USA, 2010), CCS '10, ACM, pp. 73-84.
-
Proceedings of the 17th ACM Conference on Computer and Communications Security (New York, NY, USA, 2010), CCS '10
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
17
-
-
57349085063
-
Measuring integrity on mobile phone systems
-
ACM
-
D. MUTHUKUMARAN, A. SAWANI, J. SCHIFFMAN, B. M. JUNG AND T. JAEGER. Measuring integrity on mobile phone systems. In Proceedings of the 13th ACM symposium on Access control models and technologies (New York, NY, USA, 2008), SACMAT '08, ACM, pp. 155-164.
-
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (New York, NY, USA, 2008), SACMAT '08
, pp. 155-164
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
20
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
USENIX Association
-
F. BELLARD. QEMU, a fast and portable dynamic translator. In Proceedings of the annual conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2005), ATEC '05, USENIX Association, pp. 41-41.
-
Proceedings of the Annual Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2005), ATEC '05
, pp. 41-41
-
-
Bellard, F.1
-
21
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
July
-
G. J. POPEK AND R. P. GOLDBERG. Formal requirements for virtualizable third generation architectures. Commun. ACM 17 (July 1974), 412-421.
-
(1974)
Commun. ACM
, vol.17
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
22
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
ACM
-
G. PORTOKALIDIS, P. HOMBURG, K. Anagnostakis and H. Bos. Paranoid Android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference (New York, NY, USA, 2010), ACSAC '10, ACM, pp. 347-356.
-
Proceedings of the 26th Annual Computer Security Applications Conference (New York, NY, USA, 2010), ACSAC '10
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
23
-
-
80755124476
-
-
GOOGLE INC. May
-
GOOGLE INC. Distribution of Android Versions. http://developer.android. com/resources/dashboa rd/platform-versions.html, May 2011.
-
(2011)
Distribution of Android Versions
-
-
-
24
-
-
80755182872
-
-
June
-
GOOGLE INC. Wallet. http://www.google.com/wallet, June 2011.
-
(2011)
Wallet
-
-
-
25
-
-
0031540885
-
The performance of μ-kernel-based systems
-
ACM
-
H. HÄRTIG, M. HOHMUTH, J. LIEDTKE, J. WOLTER AND S. SCHÖNBERG. The performance of μ-kernel-based systems. In Proceedings of the sixteenth ACM symposium on Operating systems principles (New York, NY, USA, 1997), SOSP '97, ACM, pp. 66-77.
-
Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles (New York, NY, USA, 1997), SOSP '97
, pp. 66-77
-
-
Härtig, H.1
Hohmuth, M.2
Liedtke, J.3
Wolter, J.4
Schönberg, S.5
-
26
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
ACM
-
J. BICKFORD, R. O'HARE, A. BALIGA, V. GANAPATHY AND L. IFTODE. Rootkits on smart phones: attacks, implications and opportunities. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (New York, NY, USA, 2010), HotMobile '10, ACM, pp. 49-54.
-
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (New York, NY, USA, 2010), HotMobile '10
, pp. 49-54
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
27
-
-
84883516955
-
On micro-kernel construction
-
ACM
-
J. LIEDTKE. On micro-kernel construction. In Proceedings of the fifteenth ACM symposium on Operating systems principles (New York, NY, USA, 1995), SOSP '95, ACM, pp. 237-250.
-
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles (New York, NY, USA, 1995), SOSP '95
, pp. 237-250
-
-
Liedtke, J.1
-
28
-
-
85084161596
-
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
-
Berkeley, CA, USA, USENIX Association
-
J. S. ROBIN AND C. E. IRVINE. Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th conference on USENIX Security Symposium - Volume 9 (Berkeley, CA, USA, 2000), USENIX Association, pp. 10-10.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, vol.9
, pp. 10-10
-
-
Robin, J.S.1
Irvine, C.E.2
-
29
-
-
51949098506
-
Xen on ARM: System virtualization using Xen hypervisor for ARM-based secure mobile phones
-
5th IEEE IEEE
-
J. Y. HWANG, S. B. SUH, S. K. HEO, C. J. PARK, J. M. RYU, S. Y. PARK AND C. R. KIM. Xen on ARM: System virtualization using Xen hypervisor for ARM-based secure mobile phones. In Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE (2008), IEEE, pp. 257-261.
-
(2008)
Consumer Communications and Networking Conference, 2008. CCNC 2008
, pp. 257-261
-
-
Hwang, J.Y.1
Suh, S.B.2
Heo, S.K.3
Park, C.J.4
Ryu, J.M.5
Park, S.Y.6
Kim, C.R.7
-
30
-
-
33846502007
-
A comparison of software and hardware techniques for x86 virtualization
-
ACM
-
K. ADAMS AND O. AGESEN. A comparison of software and hardware techniques for x86 virtualization. In Proceedings of the 12th international Conference on Architectural Support for Programming Languages and Operating Systems (New York, NY, USA, 2006), ASPLOS-XII, ACM, pp. 2-13.
-
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems (New York, NY, USA, 2006), ASPLOS-XII
, pp. 2-13
-
-
Adams, K.1
Agesen, O.2
-
32
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
USENIX Association
-
L. LITTY, H. A. LAGAR-CAVILLA AND D. LIE. Hypervisor support for identifying covertly executing binaries. In Proceedings of the 17th conference on Security symposium (Berkeley, CA, USA, 2008), USENIX Association, pp. 243-258.
-
Proceedings of the 17th Conference on Security Symposium (Berkeley, CA, USA, 2008)
, pp. 243-258
-
-
Litty, L.1
Lagar-Cavilla, H.A.2
Lie, D.3
-
33
-
-
77952331717
-
pBMDS: A behavior-based malware detection system for cellphone devices
-
ACM
-
L. XIE, X. ZHANG, J.-P. SEIFERT AND S. ZHU. pBMDS: a behavior-based malware detection system for cellphone devices. In Proceedings of the third ACM conference on Wireless network security (New York, NY, USA, 2010), WiSec '10, ACM, pp. 37-48.
-
Proceedings of the Third ACM Conference on Wireless Network Security (New York, NY, USA, 2010), WiSec '10
, pp. 37-48
-
-
Xie, L.1
Zhang, X.2
Seifert, J.-P.3
Zhu, S.4
-
35
-
-
44249095395
-
Subscriber authentication in cellular networks with trusted virtual sims
-
feb.
-
M. KASPER, N. KUNTZE AND A.U. SCHMIDT. Subscriber authentication in cellular networks with trusted virtual sims. In Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on (feb. 2008), vol. 2, pp. 903 -908.
-
(2008)
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
, vol.2
, pp. 903-908
-
-
Kasper, M.1
Kuntze, N.2
Schmidt, A.U.3
-
36
-
-
33746453742
-
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
-
Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) (Berlin, Germany, July 2006), Springer
-
MULLINER, C., VIGNA, G., DAGON, D., AND LEE, W. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) (Berlin, Germany, July 2006), vol. 4064 of LNCS, Springer, pp. 91-108.
-
LNCS
, vol.4064
, pp. 91-108
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
38
-
-
67650524502
-
-
Ludwig-Maximilians-Universität (LMU), Munich, Germany, Technical Report LMUMI-2007-1
-
O. FALKE, E. RUKZIO, U. DIETZ, P. HOLLEIS AND A. SCHMIDT. Mobile services for near field communication. Ludwig-Maximilians-Universität (LMU), Munich, Germany, Technical Report LMUMI-2007-1 (2007).
-
(2007)
Mobile Services for Near Field Communication
-
-
Falke, O.1
Rukzio, E.2
Dietz, U.3
Holleis, P.4
Schmidt, A.5
-
40
-
-
80051554650
-
-
Department of Computer Science, University of Illinois at Urbana-Champaign 11
-
R. BHARDWAJ, P. REAMES, R. GREENSPAN, V. S. NORI AND E. UCAN. A Choices Hypervisor on the ARM architecture. Department of Computer Science, University of Illinois at Urbana-Champaign 11 (2006).
-
(2006)
A Choices Hypervisor on the ARM Architecture
-
-
Bhardwaj, R.1
Reames, P.2
Greenspan, R.3
Nori, V.S.4
Ucan, E.5
-
41
-
-
84862928448
-
Virtualization is Coming to a Platform Near You
-
R. MIJAT AND A. NIGHTINGALE. Virtualization is Coming to a Platform Near You. ARM White Paper (2011).
-
(2011)
ARM White Paper
-
-
Mijat, R.1
Nightingale, A.2
-
42
-
-
20344391930
-
Intel Virtualization Technology
-
May
-
R. UHLIG, G. NEIGER, D. RODGERS, A. L. SANTONI, F. C. M. MARTINS, A. V. ANDERSON, S. M. BENNETT, A. KAGI, F. H. LEUNG AND L. SMITH. Intel Virtualization Technology. Computer 38 (May 2005), 48-56.
-
(2005)
Computer
, vol.38
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
43
-
-
80755182866
-
-
January Diploma Thesis, Chair of Operating Systems, Technische Universität Dresden
-
S. LIEBERGELD. Lightweight Virtualization on Microkernel-based Systems. http://os.inf.tu-dresd en.de/papers-ps/liebergeld-diplom.pdf, January 2010. Diploma Thesis, Chair of Operating Systems, Technische Universität Dresden.
-
(2010)
Lightweight Virtualization on Microkernel-based Systems
-
-
Liebergeld, S.1
-
46
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
W. ENCK, P. GILBERT, B.-G. CHUN, L. P. COX, J. JUNG, P. MCDANIEL AND A. N. SHETH. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation (Berkeley, CA, USA, 2010), OSDI'10, USENIX Association, pp. 1-6.
-
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (Berkeley, CA, USA, 2010), OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.N.7
-
47
-
-
78650919018
-
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms
-
Information and Communications Security Springer Berlin / Heidelberg
-
X. ZHANG, J.-P. SEIFERT AND O. ACICMEZ. SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. In Information and Communications Security (2010), vol. 6476 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, pp. 107-125.
-
(2010)
Lecture Notes in Computer Science
, vol.6476
, pp. 107-125
-
-
Zhang, X.1
Seifert, J.-P.2
Acicmez, O.3
-
48
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
ACM
-
X. ZHANG, L. VAN DOORN, T. JAEGER, R. PEREZ AND R. SAILER. Secure coprocessor-based intrusion detection. In Proceedings of the 10th workshop on ACM SIGOPS European workshop (New York, NY, USA, 2002), EW 10, ACM, pp. 239-242.
-
Proceedings of the 10th Workshop on ACM SIGOPS European Workshop (New York, NY, USA, 2002), EW 10
, pp. 239-242
-
-
Zhang, X.1
Van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|