-
2
-
-
81855212022
-
-
March
-
Android Market: March 2011 Security Issue (March 2011), https://market.android.com/support/bin/answer.py?answer=1207928
-
(2011)
March 2011 Security Issue
-
-
-
4
-
-
80755127060
-
Short Paper: A Look at SmartPhone Permission Models
-
Au, K., Zhou, B., Huang, Z., Gill, P., Lie, D.: Short Paper: A Look at SmartPhone Permission Models. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
-
Au, K.1
Zhou, B.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
5
-
-
81855212018
-
-
Tech. Rep. TR-11-06, Carleton University, School of Computer Science, Ottawa, ON, Canada April
-
Barrera, D., Enck, W., van Oorschot, P.C.: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Tech. Rep. TR-11-06, Carleton University, School of Computer Science, Ottawa, ON, Canada (April 2011)
-
(2011)
Seeding A Security-Enhancing Infrastructure for Multi-market Application Ecosystems
-
-
Barrera, D.1
Enck, W.2
Van Oorschot, P.C.3
-
6
-
-
78649990344
-
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
-
Barrera, D., Kayacik, H.G., van Oorshot, P.C., Somayaji, A.: A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android. In: Proceedings of the ACM Conference on Computer and Communications Security (October 2010)
-
Proceedings of the ACM Conference on Computer and Communications Security (October 2010)
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorshot, P.C.3
Somayaji, A.4
-
7
-
-
0003400251
-
-
Tech. Rep. MTR-2547, Vol. 1, MITRE Corp., Bedford, MA
-
Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations. Tech. Rep. MTR-2547, Vol. 1, MITRE Corp., Bedford, MA (1973)
-
(1973)
Secure Computer Systems: Mathematical Foundations
-
-
Bell, D.E.1
LaPadula, L.J.2
-
8
-
-
84860764042
-
MockDroid: Trading Privacy for Application Functionality on Smartphones
-
Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: MockDroid: Trading Privacy for Application Functionality on Smartphones. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile (2011)
-
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile (2011)
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
10
-
-
80755167433
-
-
Tech. Rep. TR-2011-04, Technische Universitat Darmstadt, Center for Advanced Security Research Darmstadt, Darmstadt, Germany April
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R.: XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks. Tech. Rep. TR-2011-04, Technische Universitat Darmstadt, Center for Advanced Security Research Darmstadt, Darmstadt, Germany (April 2011)
-
(2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.R.5
-
11
-
-
80755127062
-
Practical and Lightweight Domain Isolation on Android
-
Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.R., Shastry, B.: Practical and Lightweight Domain Isolation on Android. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
Sadeghi, A.R.5
Shastry, B.6
-
12
-
-
80755143401
-
Crowdroid: Behavior-Based Malware Detection System for Android
-
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
13
-
-
78651400128
-
Developing Secure Mobile Applications for Android
-
October
-
Burns, J.: Developing Secure Mobile Applications for Android. iSEC Partners (October 2008), http://www.isecpartners.com/files/iSEC-Securing- Android-Apps.pdf
-
(2008)
iSEC Partners
-
-
Burns, J.1
-
16
-
-
35448979944
-
SmartSiren: Virus Detection and Alert for Smartphones
-
Cheng, J., Wong, S.H., Yang, H., Lu, S.: SmartSiren: Virus Detection and Alert for Smartphones. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (June 2007)
-
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (June 2007)
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
17
-
-
79961035117
-
Analyzing Inter-Application Communication in Android
-
Chin, E., Felt, A.P., Greenwood, K.,Wagner, D.: Analyzing Inter-Application Communication in Android. In: Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys (2011)
-
Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys (2011)
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
18
-
-
84870151992
-
CRePE: Context-Related Policy Enforcement for Android. In
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
-
Conti, M., Nguyen, V.T.N., Crispo, B.: CRePE: Context-Related Policy Enforcement for Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 331-345. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6531
, pp. 331-345
-
-
Conti, M.1
Nguyen, V.T.N.2
Crispo, B.3
-
19
-
-
10944254818
-
Mobile Phones as Computing Devices: The Viruses are Coming!
-
Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing 3(4), 11-15 (2004)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
20
-
-
85037073388
-
Privilege Escalation Attacks on Android
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
-
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
21
-
-
43049166949
-
Security-by-contract on the. NET platform
-
Desmet, L., Joosen, W., Massacci, F., Philippaerts, P., Piessens, F., Siahaan, I., Vanoverberghe, D.: Security-by-contract on the. NET platform. Information Security Technical Report 13(1), 25-32 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.1
, pp. 25-32
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Philippaerts, P.4
Piessens, F.5
Siahaan, I.6
Vanoverberghe, D.7
-
22
-
-
85066347237
-
Quire: Lightweight Provenance for Smart Phone Operating Systems
-
Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: Lightweight Provenance for Smart Phone Operating Systems. In: Proceedings of the 20th USENIX Security Symposium (August 2011)
-
Proceedings of the 20th USENIX Security Symposium (August 2011)
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
23
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Applications
-
Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Applications. In: Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) (February 2011)
-
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) (February 2011)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
24
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI) (October 2010)
-
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI) (October 2010)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
25
-
-
85025700509
-
A Study of Android Application Security
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium (August 2011)
-
Proceedings of the 20th USENIX Security Symposium (August 2011)
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
26
-
-
60049083121
-
-
Tech. Rep. NAS-TR-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA September
-
Enck, W., Ongtang, M., McDaniel, P.: Mitigating Android Software Misuse Before It Happens. Tech. Rep. NAS-TR-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (September 2008)
-
(2008)
Mitigating Android Software Misuse before It Happens
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
28
-
-
60049085302
-
Understanding Android Security
-
Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security & Privacy Magazine 7(1), 50-57 (2009)
-
(2009)
IEEE Security & Privacy Magazine
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
29
-
-
80755187788
-
Android Permissions Demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android Permissions Demystified. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
30
-
-
80755181021
-
A Survey of Mobile Malware in the Wild
-
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
31
-
-
84942541638
-
The Effectiveness of Application Permissions
-
Felt, A.P., Greenwood, K., Wagner, D.: The Effectiveness of Application Permissions. In: Proceedings of the USENIX Conference on Web Application Development, WebApps (2011)
-
Proceedings of the USENIX Conference on Web Application Development, WebApps (2011)
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
32
-
-
85046879731
-
Permission Re- Delegation: Attacks and Defenses
-
Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission Re- Delegation: Attacks and Defenses. In: Proceedings of the 20th USENIX Security Symposium (August 2011)
-
Proceedings of the 20th USENIX Security Symposium (August 2011)
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
33
-
-
79955904273
-
-
accessed January 11, 2011
-
Fuchs, A.P., Chaudhuri, A., Foster, J.S.: ScanDroid: Automated Security Certification of Android Applications, http://www.cs.umd.edu/~avik/projects/ scandroidascaa/paper.pdf (accessed January 11, 2011)
-
ScanDroid: Automated Security Certification of Android Applications
-
-
Fuchs, A.P.1
Chaudhuri, A.2
Foster, J.S.3
-
35
-
-
79961080173
-
Vision: Automated Security Validation of Mobile Apps at App Markets
-
Gilbert, P., Chun, B.G., Cox, L.P., Jung, J.: Vision: Automated Security Validation of Mobile Apps at App Markets. In: Proceedings of the International Workshop on Mobile Cloud Computing and Services, MCS (2011)
-
Proceedings of the International Workshop on Mobile Cloud Computing and Services, MCS (2011)
-
-
Gilbert, P.1
Chun, B.G.2
Cox, L.P.3
Jung, J.4
-
36
-
-
80755127066
-
Short Paper: Delivering Secure Applications on Commercial Mobile Devices: The Case for Bare Metal Hypervisors
-
Gudeth, K., Pirretti, M., Hoeper, K., Buskey, R.: Short Paper: Delivering Secure Applications on Commercial Mobile Devices: The Case for Bare Metal Hypervisors. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
-
Gudeth, K.1
Pirretti, M.2
Hoeper, K.3
Buskey, R.4
-
37
-
-
84874837538
-
Smart-Phone Attacks and Defenses
-
Guo, C., Wang, H.J., Zhu,W.: Smart-Phone Attacks and Defenses. In: Proceedings of the 3rd Workshop on Hot Topics in Networks, HotNets (2004)
-
Proceedings of the 3rd Workshop on Hot Topics in Networks, HotNets (2004)
-
-
Guo, C.1
Wang, H.J.2
Zhu, W.3
-
38
-
-
80755187778
-
These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
-
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
41
-
-
80755143400
-
L4Android: A Generic Operating System Framework for Secure Smartphones
-
Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., Peter, M.: L4Android: A Generic Operating System Framework for Secure Smartphones. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
42
-
-
70450247064
-
XShare: Supporting Impromptu Sharing of Mobile Phones
-
Liu, Y., Rahmati, A., Huang, Y., Jang, H., Zhong, L., Zhang, Y., Zhang, S.: xShare: Supporting Impromptu Sharing of Mobile Phones. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (June 2009)
-
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (June 2009)
-
-
Liu, Y.1
Rahmati, A.2
Huang, Y.3
Jang, H.4
Zhong, L.5
Zhang, Y.6
Zhang, S.7
-
43
-
-
77958124029
-
Not so Great Expectations: Why Application Markets Haven't Failed Security
-
McDaniel, P., Enck, W.: Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Security & Privacy Magazine 8(5), 76-78 (2010)
-
(2010)
IEEE Security & Privacy Magazine
, vol.8
, Issue.5
, pp. 76-78
-
-
McDaniel, P.1
Enck, W.2
-
45
-
-
33746453742
-
Using labeling to prevent cross-service attacks against smart phones
-
Detection of Intrusions and Malware and Vulnerability Assessment - Third International Conference, DIMVA 2006, Proceedings
-
Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 91-108. Springer, Heidelberg (2006) (Pubitemid 44124004)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4064 LNCS
, pp. 91-108
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
46
-
-
57349085063
-
Measuring Integrity on Mobile Phone Systems
-
June
-
Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B.M., Jaeger, T.: Measuring Integrity on Mobile Phone Systems. In: Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 155-164 (June 2008)
-
(2008)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 155-164
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
47
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints
-
Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In: Proceedings of ASIACCS (2010)
-
Proceedings of ASIACCS (2010)
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
48
-
-
77954740912
-
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Nauman, M., Khan, S., Zhang, X., Seifert, J.-P.: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 1-15. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 1-15
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
Seifert, J.-P.4
-
49
-
-
74349112208
-
DiffUser: Differentiated User Access Control on Smartphones
-
Ni, X., Yang, Z., Bai, X., Champion, A.C., Xuan, D.: DiffUser: Differentiated User Access Control on Smartphones. In: Proceedings of the 5th IEEE Workshop on Wireless and Sensor Networks Security (WSNS) (October 2009)
-
Proceedings of the 5th IEEE Workshop on Wireless and Sensor Networks Security (WSNS) (October 2009)
-
-
Ni, X.1
Yang, Z.2
Bai, X.3
Champion, A.C.4
Xuan, D.5
-
50
-
-
77956609298
-
Virtualized In-Cloud Security Services for Mobile Devices
-
Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized In-Cloud Security Services for Mobile Devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (June 2008)
-
Proceedings of the 1st Workshop on Virtualization in Mobile Computing (June 2008)
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
52
-
-
77950851532
-
Semantically Rich Application-Centric Security in Android
-
December
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically Rich Application-Centric Security in Android. In: Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), pp. 340-349 (December 2009)
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC)
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
53
-
-
81855201130
-
Semantically Rich Application-Centric Security in Android
-
Published online August 2011
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically Rich Application-Centric Security in Android. Journal of Security and Communication Networks (2011), (Published online August 2011)
-
(2011)
Journal of Security and Communication Networks
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
54
-
-
78751498804
-
Paranoid Android: Versatile Protection for Smartphones
-
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection For Smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC) (December 2010)
-
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC) (December 2010)
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
55
-
-
58349116007
-
Monitoring Smartphones for Anomaly Detection
-
Schmidt, A.D., Peters, F., Lamour, F., Albayrak, S.: Monitoring Smartphones for Anomaly Detection. In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE (2008)
-
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE (2008)
-
-
Schmidt, A.D.1
Peters, F.2
Lamour, F.3
Albayrak, S.4
-
56
-
-
77950172440
-
Smartphone Malware Evolution Revisited: Android Next Target?
-
Schmidt, A.D., Schmidt, H.G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S.: Smartphone Malware Evolution Revisited: Android Next Target? In: Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE) (October 2009)
-
Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE) (October 2009)
-
-
Schmidt, A.D.1
Schmidt, H.G.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
-
58
-
-
84856229434
-
"Andromaly": A Behavioral Malware Detection Framework for Android Devices
-
published online January 2011
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: "Andromaly": A Behavioral Malware Detection Framework for Android Devices. Journal of Intelligent Information Systems (2011), (published online January 2011)
-
(2011)
Journal of Intelligent Information Systems
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
59
-
-
70450280959
-
-
accessed January 2011
-
VMware, Inc.: VMware Mobile Virtualization Platform, http://www.vmware. com/products/mobile/ (accessed January 2011)
-
VMware Mobile Virtualization Platform
-
-
-
60
-
-
79959568144
-
A Trusted Mobile Phone Reference Architecture via Secure Kernel
-
November
-
Zhang, X., Aciiçmez, O., Seifert, J.P.: A Trusted Mobile Phone Reference Architecture via Secure Kernel. In: Proceedings of the ACM workshop on Scalable Trusted Computing, pp. 7-14 (November 2007)
-
(2007)
Proceedings of the ACM Workshop on Scalable Trusted Computing
, pp. 7-14
-
-
Zhang, X.1
Aciiçmez, O.2
Seifert, J.P.3
-
61
-
-
84881048895
-
Building efficient integrity measurement and Attestation for Mobile Phone Platforms
-
Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. Springer, Heidelberg
-
Zhang, X., Aciiçmez, O., Seifert, J.-P.: Building efficient integrity measurement and Attestation for Mobile Phone Platforms. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 71-82. Springer, Heidelberg (2009)
-
(2009)
LNICST
, vol.17
, pp. 71-82
-
-
Zhang, X.1
Aciiçmez, O.2
Seifert, J.-P.3
-
62
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. Springer, Heidelberg
-
Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming Information-Stealing Smartphone Applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6740
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|