메뉴 건너뛰기




Volumn 7093 LNCS, Issue , 2011, Pages 49-70

Defending users against smartphone apps: Techniques and future directions

Author keywords

Smartphone security

Indexed keywords

FUTURE DIRECTIONS; PROTECTION MECHANISMS; SECURITY ANALYSIS; SECURITY RESEARCH; SMART PHONES;

EID: 81855220939     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25560-1_3     Document Type: Conference Paper
Times cited : (69)

References (62)
  • 2
    • 81855212022 scopus 로고    scopus 로고
    • March
    • Android Market: March 2011 Security Issue (March 2011), https://market.android.com/support/bin/answer.py?answer=1207928
    • (2011) March 2011 Security Issue
  • 13
    • 78651400128 scopus 로고    scopus 로고
    • Developing Secure Mobile Applications for Android
    • October
    • Burns, J.: Developing Secure Mobile Applications for Android. iSEC Partners (October 2008), http://www.isecpartners.com/files/iSEC-Securing- Android-Apps.pdf
    • (2008) iSEC Partners
    • Burns, J.1
  • 18
    • 84870151992 scopus 로고    scopus 로고
    • CRePE: Context-Related Policy Enforcement for Android. In
    • Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
    • Conti, M., Nguyen, V.T.N., Crispo, B.: CRePE: Context-Related Policy Enforcement for Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 331-345. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6531 , pp. 331-345
    • Conti, M.1    Nguyen, V.T.N.2    Crispo, B.3
  • 19
    • 10944254818 scopus 로고    scopus 로고
    • Mobile Phones as Computing Devices: The Viruses are Coming!
    • Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing 3(4), 11-15 (2004)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 20
    • 85037073388 scopus 로고    scopus 로고
    • Privilege Escalation Attacks on Android
    • Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
    • Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6531 , pp. 346-360
    • Davi, L.1    Dmitrienko, A.2    Sadeghi, A.-R.3    Winandy, M.4
  • 26
    • 60049083121 scopus 로고    scopus 로고
    • Tech. Rep. NAS-TR-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA September
    • Enck, W., Ongtang, M., McDaniel, P.: Mitigating Android Software Misuse Before It Happens. Tech. Rep. NAS-TR-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (September 2008)
    • (2008) Mitigating Android Software Misuse before It Happens
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 43
    • 77958124029 scopus 로고    scopus 로고
    • Not so Great Expectations: Why Application Markets Haven't Failed Security
    • McDaniel, P., Enck, W.: Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Security & Privacy Magazine 8(5), 76-78 (2010)
    • (2010) IEEE Security & Privacy Magazine , vol.8 , Issue.5 , pp. 76-78
    • McDaniel, P.1    Enck, W.2
  • 47
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints
    • Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In: Proceedings of ASIACCS (2010)
    • Proceedings of ASIACCS (2010)
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 48
    • 77954740912 scopus 로고    scopus 로고
    • Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In
    • Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
    • Nauman, M., Khan, S., Zhang, X., Seifert, J.-P.: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 1-15. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6101 , pp. 1-15
    • Nauman, M.1    Khan, S.2    Zhang, X.3    Seifert, J.-P.4
  • 59
    • 70450280959 scopus 로고    scopus 로고
    • accessed January 2011
    • VMware, Inc.: VMware Mobile Virtualization Platform, http://www.vmware. com/products/mobile/ (accessed January 2011)
    • VMware Mobile Virtualization Platform
  • 61
    • 84881048895 scopus 로고    scopus 로고
    • Building efficient integrity measurement and Attestation for Mobile Phone Platforms
    • Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. Springer, Heidelberg
    • Zhang, X., Aciiçmez, O., Seifert, J.-P.: Building efficient integrity measurement and Attestation for Mobile Phone Platforms. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 71-82. Springer, Heidelberg (2009)
    • (2009) LNICST , vol.17 , pp. 71-82
    • Zhang, X.1    Aciiçmez, O.2    Seifert, J.-P.3
  • 62
    • 85037359376 scopus 로고    scopus 로고
    • Taming Information-Stealing Smartphone Applications (on Android)
    • McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. Springer, Heidelberg
    • Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming Information-Stealing Smartphone Applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6740 , pp. 93-107
    • Zhou, Y.1    Zhang, X.2    Jiang, X.3    Freeh, V.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.